Ginagawa mo dito? ^-^
Thursday, June 15, 2017
Learning Log for Information Systems Security: Week 1 and 2 (Information Security)
Another
year another term, same professor same activity, but this professor is the BEST
in terms of Computer Networking and Security and I wouldn’t write his name here
due to the privacy of that professor, but we can call him Sir. JP. For our
first meeting, we were astonished that our past professor will be our current professor
for computer security, so in an instance, we clapped so hard and preached his
name like watching a live Fliptop battle, Sir JP!3x. After a few minutes of
idolization and homecoming, we began to study the scopes of information
security and I began to review my current knowledge about this topic and began
to cope up with the new knowledge that I am receiving. Sir JP has summarized
all his knowledge for just the title and just small amount was absorbed, and
the good thing is we are just in the title portion far from the real
integration of information security. Confidentiality, Integrity and
Availability are the first bulleted points that I have written in my notebook
and with these 3 items, I could feel the real vibe of information security. I
learned the Security Architecture is almost the same with the 7 levels in the
past networking lessons. Sir JP taught us the strong and the weaknesses of
information security if vivid knowledge was not apprehended and also the
offensive and defensive process in the system. The most interesting part of the
discussion is the authoritarian level of security wherein there are certain
levels that cannot be accessed by an ordinary person but a higher level can
access it. Sir JP had given us a case event wherein we will analyze the problem and
we must fill in the necessary requirements for the case. For the sake of the
shortness and the ending of this post in the case that was given to us stating
in the Recommendation section, in my personal opinion, if DDoS attack happen,
have a different kind of brand for your security device because not only do you
see the error but you also segregate the rotting security devices from others.
Subscribe to:
Post Comments (Atom)
Hey Sammy,
ReplyDeleteI am always touched and motivated reading your learning logs! Hope you learn a lot in the course. :)