Thursday, June 15, 2017

Learning Log for Information Systems Security: Week 1 and 2 (Information Security)

Another year another term, same professor same activity, but this professor is the BEST in terms of Computer Networking and Security and I wouldn’t write his name here due to the privacy of that professor, but we can call him Sir. JP. For our first meeting, we were astonished that our past professor will be our current professor for computer security, so in an instance, we clapped so hard and preached his name like watching a live Fliptop battle, Sir JP!3x. After a few minutes of idolization and homecoming, we began to study the scopes of information security and I began to review my current knowledge about this topic and began to cope up with the new knowledge that I am receiving. Sir JP has summarized all his knowledge for just the title and just small amount was absorbed, and the good thing is we are just in the title portion far from the real integration of information security. Confidentiality, Integrity and Availability are the first bulleted points that I have written in my notebook and with these 3 items, I could feel the real vibe of information security. I learned the Security Architecture is almost the same with the 7 levels in the past networking lessons. Sir JP taught us the strong and the weaknesses of information security if vivid knowledge was not apprehended and also the offensive and defensive process in the system. The most interesting part of the discussion is the authoritarian level of security wherein there are certain levels that cannot be accessed by an ordinary person but a higher level can access it. Sir JP had given us a case event wherein we will analyze the problem and we must fill in the necessary requirements for the case. For the sake of the shortness and the ending of this post in the case that was given to us stating in the Recommendation section, in my personal opinion, if DDoS attack happen, have a different kind of brand for your security device because not only do you see the error but you also segregate the rotting security devices from others.

1 comment:

  1. Hey Sammy,

    I am always touched and motivated reading your learning logs! Hope you learn a lot in the course. :)

    ReplyDelete