• Category Archives security
  • Be careful of what you put on the Internet

    The internet is not a safe place. Almost everyone that knows about the world wide web and its social media platforms, knows to be careful about what they put out there. One questionable post or picture, even sharing an article, can lead to something bad like, not getting the job you want, getting fired from your current job, unwanted attention, and a possibility of the authorities coming to you for questioning. We will discuss what you should and shouldn’t put on the internet whether they are on social media or putting out an article.

    We all have some sort of social media account that we may or may not use every day. Truly, it doesn’t matter if you use it every day. It matters what you put on it. Anyone can search you up on the internet nowadays, so you should reconsider putting out that picture of you drinking a cocktail at that sports bar. If anything, always maximize your privacy settings on it.

    Continue reading  Post ID 331

    Share

  • The Security of Passwords

    Almost everything is done on the internet nowadays. As a society, we continue to upgrade to the newest technology out there. Most websites use passwords for your security and will continue to use passwords. But what makes a good password and is yours secure enough to ensure your safety?

    Every website out there, that wants some type of information from you for a profile or to buy items, wants you to create a ‘sign-in’ which requires a username, usually your email, and a password. This is to ensure security of your profile because you might have personal information on it like your address, social security, card and banking numbers, orders, and much more. It’s imperative to have a password and keep it safe; for your eyes only.

    Continue reading  Post ID 331

    Share

  • What is a Firewall?

    An illustration of where a firewall would be located in a network. http://en.wikipedia.org/wiki/Firewall_%28computing%29

        The first layer of defense in your network is often the most misunderstood. In the movies and TV the hacker always seems to find a way around or through the firewall with crazy matrix like skills that defies common sense. However, if you ever encounter a true hacker they will tell you that a properly configured firewall is the most effective way to stop their attacks. Therefore, what is a firewall and what types of firewalls are out there, and what are the types that I have used at work and at home.
    Continue reading  Post ID 331

    Share

  • Computer Forensics

        Computer forensics has helped solve a number of criminal cases although a disproportional number of these cases have been for child porn, there are a few which were not. Of those non-child porn cases, one stands out, murder most foul. One murderer that would drive police and the FBI crazy for years until that fateful day that he made one mistake.
    Continue reading  Post ID 331

    Share

  • Web Site Cryptography

        Every time you connect to a website on the internet and need to send something securely you look for the little padlock in your browser to show that you have connected to a secure website. To do this we use a system called Hypertext Transfer Protocol over Secure Socket Layer (HTTPS). However, there are a number of crypto technologies that secure the connection between you and the website that you are connecting to. Below we will look at four websites and the crypto algorithms that they use in securing your connection to them.
    Continue reading  Post ID 331

    Share

  • My Top IT Threats

        I am not what you would call a normal computer user; in fact, I would even put myself above the so-called power users. I have worked in the IT field for the last 19 years of my life and during that time, I have seen a large swath of issues facing IT managers regarding security threats. These threats range from the benign to outright dangerous data destroying type. Therefore, what is the most dangerous types of security threats faced by IT managers today, let’s take a look.

    Continue reading  Post ID 331

    Share

  • Sources of IT Security Threats

       As we have moved into the 21st century, technology has become so pervasive in our daily lives that it is almost unavoidable. It was only less than 20 years ago, that one would look to their local newspaper to find work or pay bills via the postal system that has served us reliably for so many years. However nowadays finding work involves going on the internet and searching many online job search sites and debit cards along with online banking have largely replaced cash or check payments in our daily financial transactions. With this in mind let us look at why information security is important and some of the sources of information threats.

    Continue reading  Post ID 331

    Share

  • IT Manager Duels

        IT manager duels gets a second look and a longer game play session today. After playing the tutorial last week and covering, the basics of game play along with some fundamental mechanics of the game. This week like in the movie Inception, we will be going deeper but not Deep Throat deep as that would be too much for the younger readers. So where do we start? Well maybe we should look at the strategies of winning the single player game.

    Continue reading  Post ID 331

    Share

  • Internet Based Conferencing Security

        Over the years, it has always been necessary for people to have meetings. These meetings generally happen face to face, and as businesses became more globalized, it became necessary for management to travel to have these meetings. This travel although necessary was a great expense for an organization. A five-person meeting conducted in-person (involving plane travel for four of the attendees) is over seven times more expensive than a meeting conducted by audio conference, and nearly three times as expensive as a videoconference (INFOCOM, 2014). Leading to cost saving measures, which initially toke the form of conference calls over the analog phone systems.

    Continue reading  Post ID 331

    Share

  • The Best Netowrk Security Practices

                Everyone has their opinion as to what are the best security practices.  At work, we have at least 20 booklets on network security specifying in detail how to secure our network from attack.  I am not going to lie the books are very good and the information in them is sound for our network implementation, but what we consider our best security practices may not work for someone else.  Here are some of my best practices. Continue reading  Post ID 331

    Share