Week Ten – Final Blog Post- Analysis

For the past several weeks, this blog has served as a means of fulfilling an academic requirement, and as a means of personal learning and growth. Primarily, I wrote about current events and topics that I found of interest that needed more researching or understanding. The majority of these posts were focused on security issuesContinue reading “Week Ten – Final Blog Post- Analysis”

Week Nine – System Hardening: Administrative Controls and Residual Risk

When cybersecurity professionals consider residual risk, oftentimes the immediate thought is directed towards physical or technical controls. While these areas often have the most risk to analyze and mitigate, administrative controls should not be dismissed as having little risk involved. Arguably, administrative controls, as primarily dealing with the human element, may have some of theContinue reading “Week Nine – System Hardening: Administrative Controls and Residual Risk”

Week Eight – Uncommon Languages as a Security Bypass

Typical organizational security measures include signature, or even context recognition to identify malware inside the network. Attackers, forever creative, have begun to utilize less common languages to either write their malware, or for use as a file dropper to write the malware to the disk or into memory. There are several reasons why an attackerContinue reading “Week Eight – Uncommon Languages as a Security Bypass”

Week 1 Blog Entry – System Hardening Guidelines

Hysolate has come out with some system hardening guidelines for 2021. Many of these may seem to be basic information, but we still see the results of missing basic security measures implemented well. These basic guidelines are effectively a small checklist that include: Automatically applying OS updates Removing or disabling non-essential services, software, drivers, fileContinue reading “Week 1 Blog Entry – System Hardening Guidelines”