Post #7: Tech Topic Connection
Throughout
this course, I’ve learned how deeply connected network security and privacy are
to the fundamentals of information technology. As someone working in fraud
prevention and aiming to become a cybersecurity analyst, these two areas are
not just topics of interest. They are at the heart of my career path.
Understanding
how computers operate is essential in cybersecurity. In both my coursework and
real-world job experience, I’ve seen how systems process and transmit data and
how cyberattacks can exploit those processes. The textbook introduced the IPOS
model (input, processing, output, and storage), which helped me understand how
each stage is a potential entry point for threats. Tools like Scratch also
helped me understand basic program execution by showing how logic flows in real
time using motion, control, and event blocks.
Hardware
components such as the CPU, memory, and storage devices are critical in
securing information systems. Attackers often target these components using
malware like ransomware, which encrypts files stored on the hard drive and
demands payment to restore them. As Mehta and Gadhavi (2024) explain, malware
can silently alter or delete information on a system, making it a serious
global threat that demands proactive defense measures.
This
course also introduced me to programming languages, starting with Scratch.
Creating my own animated project helped me grasp the logic behind how software
runs. The textbook explained the difference between low-level languages like
assembly and high-level languages like Python. In cybersecurity, high-level
languages are commonly used for writing security tools and automation scripts,
while understanding low-level code helps security professionals
reverse-engineer malware or analyze exploits. Vinueza-Morales et al. (2025)
highlight that block-based platforms like Scratch and ALICE help learners build
programming competencies without the complexity of syntax, making them
especially effective for beginners.
I
also gained hands-on experience with application software such as Microsoft
Word, Excel, and PowerPoint. These tools fall under the productivity software
category mentioned in the course text and are used daily across industries. In
my role, I use them to communicate, log information, and detect fraud trends.
However, I also understand how these everyday applications can be targeted
through infected attachments or phishing links, reinforcing the importance of
secure software practices.
Working
with databases helped me understand how sensitive information like customer
records, credit card data, and login credentials are stored. In our lessons, I
learned that database management systems (DBMS) allow for structured data
storage and retrieval. As Chatvichienchai (2023) describes, combining
user-friendly database tools with familiar applications like spreadsheets can
help streamline secure data access and manipulation. This understanding
reinforces how important it is to maintain privacy and security across all
systems that manage personal data.
The
course also emphasized the basics of network architecture, management, and
security. I used tools like ping and traceroute to trace data movement across
the internet. These lessons helped me understand how firewalls, routers, and
other network devices monitor and manage traffic. The concept of defense in
depth and zero trust were especially impactful, as they reflect how modern
networks need layered protections and strict access controls to remain secure.
I also connected this to the CIA Triad (Confidentiality, Integrity, and
Availability), which underpins much of what we do in fraud prevention and
cybersecurity. Rizvi and Mirlashari (2023) explain that while most
organizations install firewalls, no network is completely secure without
intrusion detection systems that can detect bypass attempts and issue real-time
alerts.
Network
security and privacy are closely connected. Security protects the systems that
transfer and store data, while privacy ensures that individuals have control
over their personal information. This course helped me understand that without
strong network defenses, it is impossible to guarantee privacy. As I continue
in my IT education and career path, I will keep building on these foundational
concepts to help protect users, systems, and organizations in a constantly
changing digital world.
References
Chatvichienchai,
S. (2023). Empowering database manipulation skills: A holistic approach
integrating user-friendly database tools and spreadsheet software. 2023
IEEE Workshop on Artificial Intelligence and Education (WAIE). https://doi.org/10.1109/WAIE60568.2023.00032
Mehta,
P., & Gadhavi, R. (2024). Anticipating threats through malware detection
approaches to safeguard data privacy and security: An in-depth study. 2024
INOCON Conference. https://ieeexplore.ieee.org/document/10511971
Rizvi,
N. A., & Mirlashari, A. (2023). Machine learning-based network intrusion
detection system. 2023 International Conference on Computing,
Communication, and Intelligent Systems (ICCCIS). https://ieeexplore.ieee.org/document/10425240
Vinueza-Morales,
C. E., Tobar-Vera, S. M., & Pérez-Benito, A. (2025). Applying the
block-based programming language ALICE for developing programming competencies
in university students. IEEE Access. https://ieeexplore.ieee.org/document/10857329
Thank you so much for this wonderful information. It has definitely made me see the cybersecurity world differently.
ReplyDelete