Journal Entry #1

My major is cybersecurity, so it is directly related to the technologies that are current in the field. I enjoy cybersecurity because it is an ever-growing industry. I am always being inspired to open my mind and expand my understanding of the different cyber concepts that are out there in the world of Information Technology. The study of cybersecurity is so instrumental today, as its impacts carry over into all spheres of interest. From social media to self-driving cars, the safety of personal information and sensitive data is at the forefront of everyone’s concerns. That is why there is such emphasis on cybersecurity education. The need for individuals who are well versed in the ethics of cyber conduct is at an all-time high. Web surfers with malicious intent, known as hackers, are constantly in search of potential vulnerabilities and points of weakness that lie open and unprotected. Theses hackers often exploit these vulnerabilities with little effort or skill, but the damage that they cause can sometimes be so detrimental that it could take out all critical services for a business. Thus, why the demand for cybersecurity professionals is increasing at a virtually exponential rate. New threats create new opportunities for the innovation of technologies that combat these heinous cybercrimes. As a result, breakthrough technologies such as artificial intelligence (AI) have been on the rise. This recent technology has been used to combat cyber-attacks such as advanced persistent threats (APTs) or denial of service (DoS) attacks. Enterprises often invest in AIs because they work autonomously and can learn from patterns and trends, causing them to become more efficient and effective the more they are used. Once an AI is configured for a specific system, they can screen the incoming and outgoing traffic that takes place within a certain platform. If the AI detects any suspicious activity, it will alert the system administrator or depending on how advanced the system is, it will stop the perpetrator before they are able to cause any damage. Technologies like these and more like them are constantly being sought after.

Leave a Reply

Your email address will not be published. Required fields are marked *