Cybersecurity
-
What is a Ragnar Locker Ransomware Attack?
Ragnar Locker is ransomware that affect devices running Microsoft Windows operating systems. The Ragnar Locker method was first observed in December 2019 as part of a series of attacks against compromised networks. Biblio: Ragnar locker malware: what it is, how it works and how to prevent it–Infosec Institute
-
What is a data center? And Why Are They So Important??
Many people may have heard the term “data center” but most don’t really know what that means. Nonetheless, these data centers are incredibly important to our everyday way of life. What is a data center? Data centers are these vast, huge, sometimes-sprawling buildings dedicated to holding the back-end computer systems, machinery and associated components needed to help run what we consumers know of as “the internet”. In a way these data centers are “the cloud” that we think of when we say our info is “stored out there…in the cloud”, and these data centers can use as much electricity as a small town. What is colocation? A colocation data center…
-
What are the Different Types of Computer Networks?
Well, first, what a great question! There are NUMEROUS different types of networks, just speaking of the technical kind specifically! While all computers essentially need DATA to be useful, it is when two (or more!) computers are connected to each other, that they can exchange/share data and thus compounding/magnifying their usefulness. CAN—Campus Area Network LAN—Local Area Network MAN—Metropolitan Area Network WAN-Wide Area Network SD-WAN—Software Defined Wide Area Network
-
The Importance of Configuration
Configuration is the way a system’s settings are set during the initial set-up phase of software/hardware and also the on-going maintenance and updating of the system’s settings. It is a HUGELY important task. It can be daunting for some. It can be tolerable but boring for others. And, for yet others, it can be the absolute first place one wants to go to when setting something up! A magical place where one wants to become deeply intimate with each and every setting and how it effects other aspects of the system! Sign us up for the last camp, please! The average users knowledge of configuration of different systems can be…
-
Post-Quantum Cryptography: The Race Is On
Quantum computers and quantum cryptography have become hot industry buzzwords that are popping up more in the press. With that, the question becomes what happens to the security of our data covered by today’s pre-quantum cryptography technology? This Forbes article helps highlight solutions on the way in the race to post-quantum cryptography: The good news is that solutions are on the way. Recognizing the urgency of the task and the time needed to formulate, choose, standardize and deploy new systems, the U.S. National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography (PQC) standardization process in 2016. In July 2020, NIST announced seven third-round candidates, covering both public-key encryption (PKE) and digital…
-
What is Multi-Factor Authentication and Why is It Necessary?
Many people have heard the basics of account protection: Get a password manager for your online accounts, make your passwords complex and never reuse them. But what about Multi-Factor Authentication? What is Multi-Factory authentication, what’s so special about it, and why is it needed? Multi-Factor Authentication (MFA), also sometimes known as Two-Factor Authentication (2FA), adds another layer of security to the sign-in process giving accounts further protection against unauthorized access. MFA requires multiple (two or more elements) to be used in order to grant full authentication. Multifactor authentication consists of 3 major things: Something you know: This can be a password, or the answer to a security question that cannot…
-
WSJ–“Companies Urged to Adjust Hiring Requirements for Cyber Jobs”…
News of the current shortage of cybersecurity professionals and the demand needed in the coming years to fill roles is seemingly ubiquitous these days. There’s an interesting article in the WSJ on the correlation between the shortage of cybersecurity capable applicants available and the job requirements being posted by hiring companies & HR departments. Despite holding a doctorate in computer science and having extensive military, federal and private-sector experience, Mr. Cunningham said he is routinely approached by companies offering entry-level positions. Job postings on social-media websites for positions usually regarded as gateway roles are rife with such requirements. For instance, one post on recruiting site Glassdoor for a security operations…
-
Integrating Security Into Networking From The Ground Up…
This industry insight article from GCN discusses how moving forward, the convergence of security and networking will be needed to work together from an integrated perspective. As more of the workforce continues remote-work, the potential for attacks/threats/malicious actors increases and heightened security will continue to be of critical importance. Secure access service edge (SASE) and software-defined wide-area network (SD-WAN) technologies are designed to merge security and networking into a single, integrated solution that can rapidly and easily scale and adapt to expanding environments and requirements. These forward-leaning capabilities help agencies better plan for the future while ensuring security remains a top priority even amid ongoing changes. Traditional security solutions no…
-
Current Events Breakdown: To unlock a terrorist’s iPhone, the FBI turned to an obscure company in Australia; a technique called an “Exploit Chain” was used.
So there’s quite a juicy, drama-filled story in the Washington Post that could be a Hollywood plot line about Apple, the FBI, a terrorist’s iPhone, and HACKERS!!! Azimuth Security, a publicity-shy company that says it sells its cyber wares only to democratic governments, secretly crafted the solution the FBI used to gain access to the device, according to several people familiar with the matter. The iPhone was used by one of two shooters whose December 2015 attack left more than a dozen people dead. So, yeah Azimuth is a hacking firm for the better good you can say. Azimuth is a poster child for “white hat” hacking, experts say, which…
-
Cryptography & Cyber Security Course Notes
Crytopgraphy For Security course on You Tube. The triad of cybersecurity is: Confidentiality Integrity Availability Confidentiality refers to “the property that sensitive info is not disclosed to unauthorized individuals, entities, or processes”. —N.I.S.T. Intregrity is defined as the “guarding against improper info modification or destruction, and includes ensuring information non-repudiation & authenticity”. -NIST Availability is “ensuring timely and reliable access to and use of information”. -NIST Impact of Security Breaches: Effectiveness of primary operations are reduced. Financial loss Damage to assets Harm to individuals Threat: potential violation of security Attack: assault on system security derived from intelligent threat. Aspects of Security Security Attack—any action that attempts to compromise the security…