For the past several weeks, this blog has served as a means of fulfilling an academic requirement, and as a means of personal learning and growth. Primarily, I wrote about current events and topics that I found of interest that needed more researching or understanding. The majority of these posts were focused on security issuesContinue reading “Week Ten – Final Blog Post- Analysis”
Tag Archives: Networking
Week Eight – Uncommon Languages as a Security Bypass
Typical organizational security measures include signature, or even context recognition to identify malware inside the network. Attackers, forever creative, have begun to utilize less common languages to either write their malware, or for use as a file dropper to write the malware to the disk or into memory. There are several reasons why an attackerContinue reading “Week Eight – Uncommon Languages as a Security Bypass”
Week Six – The Importance of System Relevance
As humans we naturally age, and as expected so do information systems, software, techniques and their associated networks. This system aging can become a problem for organizations who neglect to dedicate enough resources to advancing their systems and keeping them up to date. This is even more important due to the rapid pace in whichContinue reading “Week Six – The Importance of System Relevance”
Week Five – Trusted Platform Module
Microsoft has recently announced their push for TPMs to be mandatory with the next iteration of Windows 11. So what are TPMs? A TPM, or trusted platform module, is an integrated chip or an add-on module for the system motherboard. This chip adds hardware-level security to the system. They can be used to encrypt diskContinue reading “Week Five – Trusted Platform Module”
Week 2 -DNS Sinkholes
While researching the use of honeypots, I came across the term sinkholes. One of the best ways to increase understanding of any subject is to examine various components with which they are associated. So, what are DNS sinkholes? How are they implemented and what are their uses? In order to answer this question, we mustContinue reading “Week 2 -DNS Sinkholes”