Post #7: Cybersecurity
Cybersecurity is a critical aspect of modern IT, closely connected to nearly every foundational concept covered in this course. As computers have evolved, so have the risks, making cybersecurity increasingly essential for protecting systems, data, and networks in a digital world.
Historically, cybersecurity became necessary with the rise of early malware in the 1970s. Today, understanding how computers process and store data is key to identifying vulnerabilities. Hardware, such as firewalls, routers, and encryption modules, is vital in defending against attacks. Software also plays a major role, including antivirus tools and firewalls that rely on secure code written in languages like Python, C++, and Java.
Database management is another critical component. Poorly secured databases are frequent targets for cybercriminals, making data encryption and access controls essential. On the network side, professionals must understand the OSI model and TCP/IP to monitor traffic, detect breaches, and implement strong security protocols.
The risks are very real. “In 2023 alone, there were nearly 170 ransomware attacks, making food and agriculture one of the top ten targeted critical infrastructure sectors” (Brown-Cantrell & Morris, 2025, p. 2). These incidents reveal how cybersecurity affects even overlooked industries. Moreover, “95% of cybersecurity breaches are caused by human error” (Wagner & Alharthi, 2023, p. 3), proving that technical solutions must be paired with better user awareness and training.
Cybersecurity is not an isolated topic. It ties directly into computer operations, hardware, programming, software, databases, and networks. As threats grow more sophisticated, our approach to cybersecurity must be equally comprehensive.
Reference:
Brown-Cantrell, I., & Morris, T. (2025). Why the Chicken Crossed the Road: Commercial Egg Production Cybersecurity Threats and Testbed Design. SoutheastCon 2025, 2025, SoutheastCon, 856–861. https://doi.org/10.1109/SoutheastCon56624.2025.10971609
Paul Wagner, & Dalal Alharthi. (2024). Leveraging VR/AR/MR/XR Technologies to Improve Cybersecurity Education, Training, and Operations. Journal of Cybersecurity Education, Research and Practice, 2024(1).
Comments
Post a Comment