complimentary tech

profilerkollu
PracticalConnectionAssignmentEmergingThreatsandCountermeas.docx

Running Head: Personal Reflection 1

Personal Reflection 1

Personal Reflection

By

Anil Kumar Bandi

Professor Dr. Giovanni Silvestri

University of Cumberlands

Emerging Threats & Countermeas (ITS-834-07)

Abstract

This practical connect assignment is based on my learnings and take-aways from this course. This paper addresses the various aspects of my learnings and how I can apply the learnings in my workplace. Further, major learnings and some important concepts that I have learnt have been discussed. Importance of security issues of IT systems have been discussed as well.

Information Technology has started to affect all aspects of human life in various manners. The impact of this is that IT has become an integral part of the lives of everyone in their professional as well as personal space. As a professional working with the development of IT, my job as a software engineer requires me to have a detailed knowledge of all the changes that are being introduced in the area of information technology and the new tools that have been developed for assisting the professionals in the technical area.

I took up this course for the sake of increasing and expanding my knowledge in the different areas of implementing IT services at a workplace. Through the course, I learned about the different types of security measures that are important for a company. I learned about some of the basic types of attacks that can happen on the companies like the one I work for. I also understood about the ways in which the hackers and cyber attackers have changed their ways of stealing data and information and the measures that an IT professional can take in order to protect the information of their company from such attacks (Stallings, 2016).

One of the most important concepts that I leaned from this course is about the details of developing a security unit IT system. As the nature of the cyber-attacks has become much diverse than it was a few years back, installing firewalls on the IT unit cannot guarantee a complete protection from these kinds of attacks. Apart from this, there are many new kinds of attacks that have started to be practiced because it is difficult to detect them for a system administrator like the DDoS attacks. Through this course, I learned about some of these types of attacks and the ways in which the effect of such attacks can be mitigated while ensuring that the threats are reduced for the future as well (Graham et al., 2016).

Another important aspect of IT that I learned about in the course that I found very interesting was that of the protection of National Infrastructure. through the course, I learned that there are much complicated and sophisticated systems that the various national departments of the country are using. Considering that these systems affect the life of the common people due to the abundance of information stored in them, the security of these systems be a major challenge. However, in order to overcome these challenges, experts are continuously working on techniques like separation, correlation, diversity, commonality and depth (Bullock et al., 2017).

By learning all these concepts, I believe that I have become a better informed professional and I can use the information that I have gained from this course into my personal work space. Through these methods, I am already contribution to a much safer security system that s being developed by the IT unit of my company. I have also learned about the importance of information and staying updated during the course which I will continue to do on my own level after it is over (Mingst et al., 2018).

References

Bullock, J. A., Haddow, G. D., & Coppola, D. P. (2017). Homeland security: the essentials. Butterworth-Heinemann.

Graham, J., Olson, R., & Howard, R. (2016). Cyber security essentials. Auerbach Publications.

Mingst, K. A., McKibben, H. E., & Arreguin-Toft, I. M. (2018). Essentials of international relations. WW Norton & Company.

Stallings, W. (2016). Network security essentials: applications and standards. Pearson.