Hi fellow people,
This is my very first forum entry, I hope I'm not missing out on any rules/policies of the forum.
Anyway, as part of my language course at a German university, I have to submit a short essay on an IT topic.
I was hoping someone who is a little more familiar with the English language could briefly check my text for gross mistakes.
Help would be very much appreciated.
Thanks in advance.
"Digital crime causes, according to the Center for Strategic and International Studies (CSIS), nearly $600 billion annual costs worldwide. Thus, it is nowadays within the remit of companies to take precautionary measures that prevent such attacks at an early stage. Many cybersecurity technologies have emerged from the rapidly advancing digitization that support enterprises in their endeavor to set up such measures. Some of these technologies, including “big data”, however, are not workable considering they require a complex implementation process. Other technologies, especially those associated with “cloud computing”, are not applicable because of outdated IT-infrastructures of many companies. The only technologies which fulfill the aspects mentioned above and are hence worth considering are VPNs and firewalls.
The decision which technology to introduce depends very much on the different operating principles and which of these serve the purpose better. Firewalls are software- or hardware devices that monitor incoming and outgoing data traffic and can block certain data packets based on a set of individual rules. VPNs, in contrast, are pieces of software to encrypt data traffic by creating virtual connections. While many firewalls solely operate between the established connection between the end-user and the internet, VPNs can indeed create a connection between end-users. This is particularly advantageous for companies, as in the present case, where the success heavily depends on the incorporation of this sensitive data into corporate communication through intranets.
Another aspect especially important for smaller companies is the invested effort to embed such a technology in the company. To exploit their full power, firewalls not only require many configuration steps, but the narrowly defined set of rules causes constant adaptation to the emergence of new cyberattacks on the internet. A VPN, on the other hand, is operable as soon as it has been downloaded and initialized and does not entail any further maintenance activities.
Taking now all aspects into account, a VPN meets the requirements of the research laboratory better than a firewall."