I think the method intended to use in the course was good but it has also room for improvement. Through the semester, I did the effort to keep it up with it and learned stuff but I’m not quite convinced yet if it was the best choice to learn this kind of subject. Here are… Continue reading TC2027 Class Review
Directly from googles search “security policies”. I came first to the definition of security policy just like that. Security Policy is a document with a protection plan on physical and information technology assets. Then I came to the definition of “network security policy” and that is a generic document that specifies or outlines rules for… Continue reading Network Security Policies
A network is done when two or more machines are connected together and sharing resources. The internet is not more than a network of networks. Right now I’m going to focus in wired networks security. The wire used to connect two computers using the Ethernet protocol is called UTP (Unshielded Twisted Pair). This commonly are… Continue reading Network Security
First of all I would like to say this was a post in collaboration with two other people: Cesar Cornejo and Audray (Ariadna) About everybody knows by now that systems need security in order to protect data from access of unauthorized users or malicious programs. Operating Systems are no exception to this rule. Another characteristic… Continue reading Total domination of the World! … Or at least of your OS?
Through this semester one of my goals was to learn php and hopefully understand how the backed of an application worked, it also resulted convenient because I had a course on Web development and I though I would be using it on my project for that class. But at the end I heard from colleagues… Continue reading PHP: Security Perspective
It is a fact that system administrators may found themselves also doing some security tasks within their organizations or projects, having to carry on the security of both users (technical aspects) and upper management (explain costs). What is risk analysis? This is procedure is used to estimate potential losses that may result from system vulnerabilities… Continue reading Administrating Security (Risk Assessment Methodologies)
Everyone has heard of this term at some point. Whenever a program installed in your computer doesn’t work, one of the first “recommendation” or quick solution is to turn off the firewall. This is super risky because the firewall is the first line of defense an OS has. Firewalls stands between the computer or networks… Continue reading About Firewalls