Over the last few weeks I have covered several areas. The area that seemed to be of most concern to me was mobile apps. With the use of smartphones continually increasing, the chance of attacks coming from them may also increase. Other concerns also caught my attention and I don't feel I specialized in any one area.
I have used many resources to back up my articles. The text for the course was CISSP Guide to Security Essentials by Peter H. Gregory. In addition to the text, I have used some of my life experiences such as my service in the United States Air Force to provide some examples of situations that require a response plan. I think that using examples from daily life can provide valuable lessons as well. For example, after fixing a friend's computer, I was able to write about that experience.
Other references that I have used are the experiences from the applications and tools that I have used in the course that inspired this blog. I used the Google Play Store to research apps such as the ones for the cell phone number spoofing. I used the Microsoft Threat Analysis Tool to create a threat assessment. I used the Belarc Advisor to evaluate the system that I do work on. Finally, I provided many screenshots of Piriform's CCleaner.
I have found that experiencing IT threats provides valuable insight that can be shared. The assignments for my network security class provided inspiration for many of the articles. Being able to share my experience with applications has allowed me to better understand threats to my system and threats to a future employer's or client's system. This has been a rewarding experience for me.
I have used many resources to back up my articles. The text for the course was CISSP Guide to Security Essentials by Peter H. Gregory. In addition to the text, I have used some of my life experiences such as my service in the United States Air Force to provide some examples of situations that require a response plan. I think that using examples from daily life can provide valuable lessons as well. For example, after fixing a friend's computer, I was able to write about that experience.
Other references that I have used are the experiences from the applications and tools that I have used in the course that inspired this blog. I used the Google Play Store to research apps such as the ones for the cell phone number spoofing. I used the Microsoft Threat Analysis Tool to create a threat assessment. I used the Belarc Advisor to evaluate the system that I do work on. Finally, I provided many screenshots of Piriform's CCleaner.
I have found that experiencing IT threats provides valuable insight that can be shared. The assignments for my network security class provided inspiration for many of the articles. Being able to share my experience with applications has allowed me to better understand threats to my system and threats to a future employer's or client's system. This has been a rewarding experience for me.
Comments
Post a Comment