For the last two weeks in our class, all topics have been spread out to the class as we were informed by our respected Professor Justin Pineda. He shared all about security measures that relates not just in our subject manner but also relates to everyday lives we encountered each day. As Sir Justin Pineda asked this question, "If someone hacks your system, will it be okay if you will hack him back?" In real life, its the same scenario as someone hurt you whether it is intentional or not, will you be that kind of person that will fights back just to get the revenge from that hacker or attacker? We talked about cryptography and physical security. It was rather fun learning about those two topics but out of the two, I really liked physical security more because unlike cryptography, it didn't have math in it. I like math and all but I gotta admit, that topic was challenging because you really had to analyze it. The physical security topics was fun because we got to hear stories about a fireman from sir. Plus, the exercise in that topic can really make you think about the security measures the school has and if they're effective or ineffective or if they use the right tools for certain situations. Viewing and logging this activity can provide an insight into the level and types of threat a network infrastructure faces while distracting attackers away from assets of real value.
THE ONE!
Stories on the life of Brian Olores.
Saturday, September 2, 2017
LEARNING LOG 4
Last week, we had discussions about ethics. Ethics in hacking specifically. As we all know hacking is a bad operations performed by hacker to bypass systems and get necessary information. However, during the previous two week, Mr. Pineda was able to defend and explained about hacking back is fine under some circumstances.
The debate went well, we were able to present our arguments and support them. I gotta admit, I was nervous about it because debates are unpredictable but I was excited at the same time because I knew that I can support my case well, although I feel like I was not able to present it very well because I was excited and nervous that I think my voice faltered while I was talking.
Moreover, in the span of two weeks, SOCIT days happened and we were asked to join a seminar about VR technology. It was an instruction of our prof to join the seminar. And after going to the seminar a ton of information about VR was introduced to all participants.
The debate went well, we were able to present our arguments and support them. I gotta admit, I was nervous about it because debates are unpredictable but I was excited at the same time because I knew that I can support my case well, although I feel like I was not able to present it very well because I was excited and nervous that I think my voice faltered while I was talking.
Moreover, in the span of two weeks, SOCIT days happened and we were asked to join a seminar about VR technology. It was an instruction of our prof to join the seminar. And after going to the seminar a ton of information about VR was introduced to all participants.
LEARNING LOG 3
This week, we learned how to apply access control in our exercise. It was fun to learn something new. I loved how our professor answered all of our questions, even though they might be only a small section or part of the exercise, I liked how he helped us out. Also, we talked about legal issues and privacy. We discussed cyber crime and laws concerning privacy. It was interesting to learn about these new information because they gave light to a topic I have not encountered before. What stuck with me in our lesson was the Apple v. FBI case. My respect for Apple was renewed and I was touched by their decision (even though I am not an Apple user) to not help the FBI. Apple showed that they value their customer's privacy atop of everything else and I applaud them for that. Having said that, I will change my phone to an iPhone--not(it's too expensive), but seriously I'm glad I understood this week's lesson and I look forward to next week's.
Tuesday, July 4, 2017
LEARNING LOG 2
Organizing Security models is one topic we all been aware of. Sir Pineda was able to discussed three models. Bell-LaPadula model, Biba and Clark-Wilson model. Bell-LaPadula model is describing to the access of internet and having the controls which can be labeled on any objects. An access control to all objects having the permission or a clearance to the said objects before you can actually access it. The model have a so-called Security labels which divided to its range.
Meanwhile, Biba model or so-called Biba Integrity model is a kind of security model that illustrates as a rule for a protection of a data. The entities in the system are divided into subjects and objects. Biba model has a term used which is a "Secure state". It is a term to describe each state transition preserves the security by moving it to secure state.
All these models I have discussed is all about how security were arrange to its own perspective. It shows how to make things right especially when defining the level category like having one access based on your position. These three models prove that one employee should not be able to read all the confidentiality measures in a higher position of an another regular employee.
Meanwhile, Biba model or so-called Biba Integrity model is a kind of security model that illustrates as a rule for a protection of a data. The entities in the system are divided into subjects and objects. Biba model has a term used which is a "Secure state". It is a term to describe each state transition preserves the security by moving it to secure state.
All these models I have discussed is all about how security were arrange to its own perspective. It shows how to make things right especially when defining the level category like having one access based on your position. These three models prove that one employee should not be able to read all the confidentiality measures in a higher position of an another regular employee.
Tuesday, December 20, 2016
Week 10-11
On our week 10 and 11, Sir Justin Pineda had given us a project. All the groups have been given a network monitoring tool to research about and use in an actual network. Our group was given the PRTG Network Monitor. At first, we were relaxed as we were told by our professor that it was easy to use and configure but when we installed it, we had so many problems configuring it.
We had so many sleepless nights because of that. We were having a hard time adding sensors in the network because when we add sensors, it shows a lot of errors. We had try using a VMWare or a virtual machine but still it didn't work.
We had to ask the other section on how they configured their PRTG application. We were relieved when they told us how they done it. We were the last group to present, we had no more additional points because we were late to present, but we are still relieved that we had the application running.
We had so many sleepless nights because of that. We were having a hard time adding sensors in the network because when we add sensors, it shows a lot of errors. We had try using a VMWare or a virtual machine but still it didn't work.
We had to ask the other section on how they configured their PRTG application. We were relieved when they told us how they done it. We were the last group to present, we had no more additional points because we were late to present, but we are still relieved that we had the application running.
Subscribe to:
Posts (Atom)