Joseph Doss
Forum Replies Created
-
AuthorPosts
-
Joseph Doss
ParticipantThis makes me think of not evil spirits , but our everyday struggles. Like the evil spirits within Legion, they are many but running to Jesus, he can remove them all.
Joseph Doss
ParticipantSeveral ways fires could be prevented or stopped would be to build the server room with fireproof materials for the walls/flooring to avoid fire spreading from other parts of the building, if one started this would also prevent fires from starting inside the room. Proper wire management and upkeep of equipment could also lessen the odds of a fire starting. Dry water lines could provide fire suppression without the chance of water leaking onto equipment and C type fire extinguishers should be kept in the room as they are used for electrical fires.
Joseph Doss
ParticipantThink of the movie The Matrix, in essence it’s about group of hackers that are attempting to take down a global power facility, their motive is that they find that this facility is very unethical in they way they treat their employees so they are attempting to entirely close the facility using their hacking skills.
The means is that they find a weakness in this facilities cybersecurity setup in the form of a glitch which they exploit in order to gain more access and take more and more control of the computer systems.
This attack could have been prevented or stopped by simply patching this glitched application, proper system testing may have also aided in a stronger security setup. In not patching this glitch the facility provided theses hackers the opportunity to breach their systems.
Joseph Doss
ParticipantOne way, and perhaps the most important is to have a plan, what do we do if X occurs and how do we go about doing that? We need to be ready for fires, ask where do we go, where do we send our data or other assets. Put in place fire suppression systems and evacuation routes. What about natural disasters, major storms, floods, earthquakes (is applicable) we could have offsite data centers with emergency backups, cold/warm/hot sites to pick up if needed. It is also possible to offload some efforts unto a third party using cloud services.
Joseph Doss
ParticipantStorms of life tend to come and go in our lives and like the weather, some are small some are large, some storms are quick and some last a long while. But it is important to seek shelter in God to protect us in our storms of life, as we would seek shelter in our homes to avoid the rains and the winds.
Joseph Doss
ParticipantThe SDLC is important as it is a process that ensures a software is properly planned, tested, created, rolled out, and has continued updates for found exploits and flaws. this ensures that a application can stay secure over its lifetime.
Joseph Doss
ParticipantSome database security issues can simply be misconfigurations, an open port that could allow attackers access, poor admin passwords, or incomplete/lazy programming that could lead to an SQL injection, as demonstrated in this video https://www.youtube.com/watch?v=2OPVViV-GQk
Joseph Doss
ParticipantOne attack mentioned in this weeks video was a “side channel attack” there is one known as the TEMPEST attack, in this type of attack special equipment is used to capture the RF signals emitted from an electric device, such as a computer monitor. Attackers are then able to reconstruct the output of the monitor. Such methods can be used to capture data before it is encrypted. an SO could implement RF blocking material to prevent stray RF signals from being captured or read
Joseph Doss
ParticipantI can very much see division now days, a good example would be the modern political sphere. We become more and more polarized everyone fighting for their “team” and disregarding the impact on those around them. But, this seems to happen in everything church, family, social media groups and so on as if we all have forgotten that we are made in the image of God, we do not see each other as human but obstacles.
Joseph Doss
ParticipantOne type of attack is DNS spoofing, this is where DNS server or a DNS cache is compromised in a way that re directs internet traffic from a website to another, typically a look alike, someone may enter login information, which the attacker then receives.There is also a man in the middle attack, in this security issue internet in routed through an attackers machine before sending the users traffic to the site of resources they intended to access, the attacker then eavesdrops on the traveling data, which is why connecting to a VPN while using public wifi is impossible. A third security issue to keep in mind would be phishing, where face emails are sent out to a specific target or on mass to random people asking for information while appearing to be a trusted source in order to get targets to click links, send information ect. So it is important to be able to tell where the message came from.
Joseph Doss
ParticipantI’m going with tree typology and mesh typology. Mesh would likely be the best option as it has load balancing and avoids a single point of failure. Speaking uptime, which is critical for most businesses, A network security officer would not have to worry as much about taking a system down for updates and or maintenance because lack of single points of failure. Tree typology while a failure point would not bring down the entire network it could bring down a large portion depending on the “branch”
Joseph Doss
ParticipantFunny enough this was the topic of this weeks sermon at my church. At times I do feel or find myself to be spiritually suck, it seems easy to get caught up in sins with all the temptations and distractions of the modern day. It’s important to stick with not only God but Christian friends and company that can support you in your spiritual walk.
Joseph Doss
ParticipantSymmetric ciphers use a single encryption key to both encrypt and decrypt data. Think of a lock to your house, the items inside of your home being the “data”. outside looking in the items or “data” cannot be viewed but once inside you can see the items (data) The encryption key being the key to your door if you use you key to unlock your door or “decrypt” the data you can see what is inside. The door to the home can only be locked and unlocked by the same key, just as your data is encrypted and decrypted by the same single key.
An example of an encryption method would be the Data Encryption Standard, this encryption method in a way scrambles or encodes your data (the house and lock) and a key to un-encoding that data is created (your door key) anyone with that key can open the door, but without the key the door stays locked (your data stays secure)
Joseph Doss
ParticipantDo you like information technology? Have you an interest in cybersecurity? We are seeking a self-motivated Security Manager to join our team!
Do you have experience with keeping and managing logs, records management, or patch management?
As a Security Manager you will be responsible for preventing and responding to security incidents, ensuring employees have proper access levels of information, guiding in control processes and ensuring patches are installed properly and on a timely manner.
we look forward to meeting you! If interested contact us at (123)45678 or via email (email@email)
Joseph Doss
ParticipantIdentity management, authorization techniques, SSO, and access control monitoring are all forms or methods of protecting data from unauthorized or underprivileged users. Authorization techniques may include Something you know, something you are, something you have such as things like passwords or passphrase possibly keys or fingerprint scanners, which can lockdown data on a device or locations like server rooms.
SSO is a method of a single time sign on, an example may be social media like facebook, which only requires you to authenticate yourself a single time (unless logged out)
Access control monitoring is a method of keeping track of a users access history.
-
AuthorPosts