Posts

Learning Log # 6

We recently studied about Physical Security. First of all, I did not realize how important Physical Security is when it comes to Information Security, I only thought of securing networks, ports etc. when we talk about information security. But this week, I am more focused on our Machine Problem, which is a Network Intrusion Detection System. For this we chose an open source software called Snort. At first glance, studying and running Snort seemed like rocket science, but after watching a few video tutorials, it made things a lot clearer for me. 

Learning Log # 5

Ok so in the past two weeks, we mainly discussed two topics. Encryption & Decryption Access Lists For Encryption and Decryption. First off, what is encryption? Well, encryption is basically converting the message's content to symbols or characters that doesn't make sense, unless deciphered. I learned that there can be different ways of encrypting messages and files. In my opinion, encrypting your files can be one of the most basic, but still a highly effective method in securing your files from unwanted parties. It's not difficult to learn encrypting too! One of the other thing I learned this week is access lists. It's basically setting up restrictions in networks. In other terms, you can call access-lists "restrictions". For example, you can block access to certain ports, which in turn, would disable access and capabilities based on blocked port, you can also block a certain IP etc. I think setting up these access lists is a must for com...

Learning Log #4

Image
This week groups mostly presented their take on their given whether they are pro or anti.  The topic I am most engaged in is, of course, our topic. It is about Internet censorship and whether the government should be given control of it, like in China. We (my group) oppose the idea, because the Internet is a powerful tool and nobody should be given control of it and its contents. The Internet in China is a perfect example of this, Chinese people practically only see things what their government want them to see and any statement about opposition to their government will be pacified quickly.  There are many other interesting and thought provoking statements made by the other groups on their respective topics. For example, Bitcoin rising as 'the' virtual money and legalities behind it.

Learning Log #3

Learning Log # 3! The past two weeks, we studied about cyber crime. I learned the different roles of computers in different cyber crimes. They(cyber crimes) can be either computer assisted, in which the computer is the main factor in facilitating the crime. Another role of computers in cyber crimes is computer-targeted wherein the computer is the "victim" of the crime. Last one is computer incidental, where the computer is not mainly associated with the crime but is still critical element of the crime. These divisions gave me an insight that all cyber crimes are not necessarily the same in nature. I also learned different laws in the US and the Philippines that aims to help maintain order in the within the realms of cyber space. Compared to the US laws in the Philippines are still lackluster, with only mainly two laws, there are still other possible crimes being overlooked.  2cents

Learning Log # 2

Image
"NOT A LOT GOING ON AT THE MOMENT" Basically sums up the week, and no, this blog's theme is not Taylor Swift.  For INFOSEC our professor introduced us to Cybrary. It is a website wherein you can get various certifications involving technology. Since Cybrary is very generous, they are giving out a codes for free certification exams. I suggest giving the website a visit. It's free certification. FREE! There are many fields of technology to choose from and there are courses for beginners, intermediate, and advance, for example:  Mobile Device Security Fundamentals Subnetting Cloud Management And many more! Aside from the free certifications, there are many useful courses. I see myself visiting this website more in the future.  About the free certification I was talking about earlier, I took the test for Mobile Device Security Fundamentals. If you actually check out the modules, everything you need to pass is actually already there. Th...

Learning Log # 1

Image
Another term starts in Asia Pacific College (unfortunately), which means new subjects and new challenges, I've never been more unenthusiastic about starting a new term, but it must be done. It's been a while since I've started writing in a blog again and I must say, I still suck at writing.  So this time around, I'll be writing about things I learned from one of our classes which is Information Security or INFOSEC for short. Reading those words "Information Security" I was already 99.9% sure what it was going to be about. Obviously, my assumptions were correct. Oh yeah, one other thing before I start, I didn't take the COMSEC1 elective because I have no idea if I will like securing computers (or information), so before I consider choosing COMSEC2 for my next elective I will, as they say, "test the waters" of securing computers (or information. Whatever.) in INFOSEC.  Finally starting the real purpose of this blog, the reason I'm ...