ePortfolio entry #9

Since the first IDS system was researched and developed by Dorothy Denning and Peter Neumann between 1984 and 1986 (Bruneau) computers have made the world safer. IDS systems are knowledge based, network based, and/or host based. This system has become an essential tool for computer safety.

Firewalls first emerged in 1988 and have three generations of development and use under their belt. (Google) Firewalls are an “in between” protecting different parts of the network form each other. These have added an extra layer to computer security, making the world a little bit safer from malicious activity.

V.P.N.’s started back in 1995 with the introduction of the PPTP (Point-to-Point Tunneling Protocol) to allow computer to communicate safely. Today they offer more anonymity, access to restricted content based on location and help hide us from potential hackers.

On the flip side, Computers have also help make the world less safe. The introduction of the IOT (Internet of Things) devices that have been pushed out in mass quantities to the public. These devices are in almost everything we use daily. Just like most things that are made in huge quantities at a time, they are often made cheaply and lack firmware updates regularly. These three ingredients provide a recipe for disaster. The disaster in question is the ability to be easily hacked. Now say if these devices are on the same network as the main computers of a home or business, it makes getting in relatively easy. This data is always on the edge of being misused for the wrong reasons by the wrong people. 

Speaking of data, now your personal data is everywhere just waiting to be hacked. Private data is just that; private. Today most people just willingly trust service agreements by these companies and hope their data stays private without reading the fine print.

National security is connected to computers as governments are connected to militaries. Research shows that U.S. Presidents “have linked the emerging problem of cybercrime with already established problems of national security or international security” (Marion). The more technology improves in terms of computers, so does the hackers ability to break the new technology.

Works Cited

Bruneau, Guy. “The History and Evolution of Intrusion Detection.” Security Reading Room. 2001. Online.

Google. https://sites.google.com/site/firewallsfordummies/history-of-firewalls. n.d. 27 March 2021.

Marion, Joshua B. Hill & Nancy E. “Presidential rhetoric on cybercrime: links to terrorism?” Criminal Justice Studies, 29:2 (2016): 163-177.

Leave a Reply

Your email address will not be published. Required fields are marked *