Skip to main content

Posts

Showing posts from August, 2017

A Recap of the Last Few Weeks

Over the last few weeks I have covered several areas. The area that seemed to be of most concern to me was mobile apps. With the use of smartphones continually increasing, the chance of attacks coming from them may also increase. Other concerns also caught my attention and I don't feel I specialized in any one area. I have used many resources to back up my articles. The text for the course was CISSP Guide to Security Essentials by Peter H. Gregory. In addition to the text, I have used some of my life experiences such as my service in the United States Air Force to provide some examples of situations that require a response plan. I think that using examples from daily life can provide valuable lessons as well. For example, after fixing a friend's computer, I was able to write about that experience. Other references that I have used are the experiences from the applications and tools that I have used in the course that inspired this blog. I used the Google Play Store to resea...

System Evaluations

This week I learned about some software that can evaluate how secure your computer is. The cool thing about this software is that it is free for personal use. I used this to evaluate my system and was amazed at how much information was available in this evaluation. This tool is called the Belarc Advisor. Details are provided for the system hardware and software installed on the system. This tool will even give you a list of software licenses on your computer. What I found interesting was the different versions of software that are installed on my system. The tool doesn't just stop there. Evaluations are available for the network you are connected to. Even the devices that are connected to the network can be mapped. The advisor will even give you a list of the device names. Maybe the most important part is that it can give you a snapshot of your virus protection and updates. These are important because viruses can destroy information systems and unpatched software can allow ne...

My Experience With a Slow Computer

This week my wife asked me if I could fix her friend's computer. I asked her what made her think it needed to be fixed. She said that her friend said that it was running slow. I thought this would be a great way to practice what I had learned in all of my coursework for my Associates of Applied Science Degree in Computer Information Systems. Her friend brought the computer to me and we pressed the power button. About five minutes later, she was logging in using a fingerprint scanner. About ten minutes after that, I was looking at her desktop. I could see that her computer was moving painfully slow. I wanted to see what was using all of her resources so I opened task manager on her Windows 7 machine. Nothing seemed to be bogging down the processor so I looked at what programs she had installed. I went to settings and looked at the system information. She had 4 GB of RAM which is plenty for Windows 7. Her processor was faster than mine. I decided that it was not a hardware issu...

The Two Person Policy

This week in my network security class, we covered ways to apply administrative countermeasures to security threats. One way that I found to be the cheapest and most reasonable was the separation of duties. This way of doing business has multiple benefits. First, separation of duties can lessen the possibility of fraud. According to our text, CISSP Guide To Security Essentials by Peter H. Gregory, when a task requires two or more people, the chances of cooperating are reduced. Inappropriate actions are less likely to be carried out because someone is there to halt the incorrect act. If the other person sees a reason the task should not be performed, the task can also be stopped. The addition of a user account should be controlled by more than one person to prevent unauthorized or unnecessary access to a network or system. The individual requesting access should be required to submit a formal request to that person's supervisor. In turn, that person's supervisor should be ...