Learning
-
World Cybersecurity Forum (1st Quarterly Clubhouse Edition)
We held the first World Cybersecurity Forum this past week and it was a great success! The World Cybersecurity Forum was a 24-hour event held for the first time this year on Clubhouse! The event featured cyber experts from around the world, and was an event open to all with the mission of demystifying cyber, creating awareness and answering the public’s questions. The World Cybersecurity Forum believes that cybersecurity is EVERYONE’S responsibility. Organized by Jacqueline Jayne, Security Awareness Advocate at KnowBe4, Jacqueline or, JJ, for short, can be found on LinkedIn. The session aimed to bring the best minds together from around the world to talk about all things cyber.…
-
What is Zero Trust?
Zero Trust Castle & Moat construct (which assumes that all security threats come from outside an organization) is outdated & problematic. Shift in attitude from trusted to untrusted. Trust is a vulnerability. Workers (users) are our weakest link No trust-by-default… Instead, Why don’t we inherently distrust everything? The user today needs a variety of access methods to a multitude of systems (while simultaneously NOT trusting them). The ‘Zero Trust’ model allows workers to perform their roles & responsibilities in a much more secure, much less trusted environment. The framework was conceptualized by Forrester Research in 2010. Not “Trust, but verify” rather, “Verify, then trust…but only a little.” No person is…
-
CompTIA Security Plus + Full Course [VIDEO]
Security+ Full Course video from YouTube. **** Topics Discussed **** Introduction to Network Devices (part 1) (0:00) Introduction to Network Devices (part 2) (8:06) Introduction to Network Devices (part 3) (15:50) Secure Network Administration Concepts (34:00) Cloud Concepts (41:00) Secure Network Design Elements and Components (48:00) Common Network Protocols (part 1) (55:20) Common Network Protocols (part 2) (1:01:00) Common Network Protocols (part 3) (1:08:00) Wireless Security Considerations (1:13:54) Risk Related Concepts (part 1) (1:23:12) Risk Related Concepts (part 2) (1:29:43) Risk Related Concepts (part 3) (1:36:08) Integrating Data and Systems w Third Parties(21:50) Risk Mitigation Strategies (1:41:27) Basic Forensic Procedures (1:46:17) Incident Response Concepts (1:54:15) Security Related Awareness and Training…
-
IP Addresses, Subnet Masks, Subnetting, and Calculating Hosts
IPv4 IP addresses are a 32-bit (binary digit) value. IP addresses are just strings of 32 binary digits (bits!). ex: 11000000101010000000010000000010 Broken down into 4 groups of 8, separated by dots (periods/decimals). ex: 11000000.10101000.000001.00000010 Now each 8-bit value, octet, is converted to a decimal number between 0 and 255 (for a total a 256 options). So the above would translate to: ex: 192.168.4.2 This is “dotted decimal notation” aka “the dotted octet numbering system”. Tip: You should memorize that 0=00000000 and 255=11111111. You’ll find knowing this very helpful. Note: By definition, all computers on the same network have the same subnet mask and network ID. /24 is limited to IP…
-
The TCP/IP Reference Model and Layers
The TCP/IP model is a more concise take on the OSI model. The TCP/IP model contains four layers: Process/Application Layer Host-to-Host/Transport Layer Internet Layer Network Access Layer/Link Layer Network Access Layer The Network Access Layer defines how to use the network to transmit an IP datagram, or unit of information packet. The Network Access Layer is: the lowest layer physical, data link, network a directly attached network the protocols provide the means for the system to deliver data to other directly (physically) attached network devices. must be able to know the details of the underlying network (packet structure, addressing, etc.) Gateways are devices that switch packets between different physical networks.…
-
What is a social engineering attack?
Social engineering is using human interaction (social skills) to obtain or compromise data/information about an organization or its computer systems. This information can them be used to deploy an attack and/or penetrate a network further. Social engineering attacks are particularly dangerous because they prey on our human instincts, interactions and dealings with people and our contextual environment. An attacker may not fit the stereotype we hold in our heads. Social engineering preys on the fact that humans will have our guard up for natural signs of danger and natural enemies, but things get fuzzy when the distinction is not so clear. In social engineering, the attacker may seem unassuming, respectable…
-
Notes To Know: “Fundamentals of Telecommunications” by Roger L. Freeman—Chapter 1 Introductory Concepts
(Note: This is an evolving, evergreen post.) Chapter 1–Introductory Concepts What is Telecommunication? “Communications at a distance.” —Webster Dictionary “The transmission of signals over long distance, such as by telegraph, radio or television.” —IEEE Standard Dictionary Telecommunications is one of those words that has broad scope, meaning and coverage. It can mean different things to different individuals. “Fundamentals of Telecommunications” brings forth the following definition: “Some take the view that telecommunications deals only with voice telephony, and the typical provider of this service is the local telephone company. We hold a wider interpretation. Telecommunications encompasses the electrical communication at a distance of voice, data, and image information (e.g., TV and…