Entropy In Information Security

     In this week's module 4 we looked at the entropy in Information Security. You may ask what is entropy? Well, entropy in information security is used to produce random numbers that are used into making security keys to protect data while being stored or in transit. In my blog, I will be going through the connection of entropy, paradigm shift, and S-curve within Information Security.

        After reviewing and completing this week's module we were to write a blog about entropy in our field of study. I will be focusing on the tools created to be used in information security and how the business as a whole will perform. It may be easy to create tools, but it's not easy to use a tool that didn't stop you from hackers getting into your data. Therefore, every tool needs to be tested thoroughly providing the utmost online security while on the web or just having your computer/laptop on. Which someday I will be the one creating the tools to help protect users online from hackers because I once had been hacked, and it wasn't fun.


    The S-curve is a chart used to display the initial slow growth(entropy) of the new product created in information security. Providing the performance of the product and business over time. Creating strong tools will increase the business's brand and consume more customers in purchasing their products, but that's never the case, there will be flaws in some of the tools that'll give the hacker the ability to hack into the system which will be a slight downfall. As the company grows, products will improve. There are always going to be years of growth, maturity, and a decline in entropy.

       
Lastly, the paradigm shifts in Information security happen when newer tools see a dramatic change in the method of working or manufacturing of a good or office. In technology and leadership, we will build skills and create strong tools that'll help the organization reduce risk and improve online hacks faster rather than an organization failing a mission and going out of business.

    In conclusion, I really enjoyed this week's module in Technology in Leading and Learning for making me dive deep into my field of study seeing how it was created, how it is going, the downfall, and seeing how it'll become in the future with the help of the S-curve chart. Also getting a better understanding of the entropy in Information Security I honestly can't wait to go into my field of study and create strong tools to improve the company and users of the product from cyberattacks. 


Comments

  1. Hello, I find your blog interesting as I never thought about how Entropy and information security connect.

    ReplyDelete

Post a Comment

Popular posts from this blog

Welcome to my blog: My Journey In Technology for Leading and Learn

Flywheel Strategy For Information Security