Post #7 - Tech Topic Connection
Cybersecurity: Connecting IT Fundamentals
This course has helped to start viewing Cybersecurity as more than just protecting passwords. Cybersecurity is a core part of how modern technology works for us on today. As I’ve learned in TEC 101, cybersecurity connects to every major aspect in information technology, from hardware and software to networks and databases. In this post, I’ll show how cybersecurity actually ties into the fundamentals of IT and why it matters for small businesses like mine.
History and Operation of Computers
Cybersecurity has grown alongside the history of computers. Early machines were pretty much isolated, but today’s systems are connected to global networks which now makes them more vulnerable. Understanding how computers operate from binary code to operating systems is what helps to explain how threats like malware and phishing attacks work.
Hardware Components
Cybersecurity also depends on hardware like routers, firewalls, and servers. These devices manage data flow and protect against unauthorized access. If hardware is outdated or misconfigured, it can become a weak point for any corporation or organization. Connolly et al. (2020) found that poor system maintenance often leads to ransomware attacks, showing how hardware and security go hand in hand.
Programming Languages
When I began this academic journey, I vowed to stay clear from programming. Since then, I have actually begun to learn that Security tools are built using languages like Python and C++. These programs work to detect threats, encrypt data, and monitor systems. to understand how programs run, whether compiled or interpreted helps identify how malware spreads and how to stop it.
Application Software
Software like antivirus tools, password managers, and monitoring apps play a major role in cybersecurity. Even business apps that I have worked with in my small business like GorillaDesk or ServiceTitan need secure logins and encrypted data to protect customer information.
Database Management
Databases store all of the super sensitive data like customer records and billing info. Protecting the private information of my clients is one most important aspect of my profession. Cybersecurity ensures these databases are encrypted, backed up, and protected with access controls. A breach in database security can lead to identity theft or financial loss.
Network Architecture and Security
Cybersecurity is deeply tied to network design. Firewalls, VPNs, and secure Wi-Fi setups help protect data in transit. Network monitoring tools detect unusual activity, and segmentation limits how far an attacker can go. Training staff to recognize phishing and smishing attacks is also part of network defense.
My Final Thoughts
Cybersecurity connects to every part of IT—from how computers run to how data moves across networks. TEC 101 helped me understand these connections and gave me the tools to protect my business and prepare for a future in cybersecurity. Whether I’m securing a pest control app or defending a network, I now see how every piece of technology plays a role in keeping systems safe.
References:
Ghazi-Tehrani, A. K., & Pontell, H. N. (2021). Phishing evolves: Analyzing the enduring cybercrime. Victims & Offenders, 16(3), 316–342.
Connolly, L. Y., Wall, D. S., Lang, M., & Oddson, B. (2020). An empirical study of ransomware attacks on organizations: An assessment of severity and salient factors affecting vulnerability. Journal of Cybersecurity, 6(1).
TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com

Comments
Post a Comment