For the Week 11, the INFOSEC class taught by sir JP had 3
meetings overall and it should be 2 meetings per week and it is because of the
Wednesday had a Monday schedule, the schedule of the INFOSEC is Monday and
Thursday. For the first day of this week, sir JP had a review with
cryptography, specifically in RSA and Diffie-Hellman Algorithm. I really
enjoyed these two algorithms because of them were very challenging to answer
and sir JP had given us an exercise about these two algorithms. The exercise
was moderately hard because there are conditions starting with the RSA, the
condition is that 3-digit prime number must be used for the value of p and q
since the overall answer must be equal to 1, and the values must not be equal 0
and 1, the value of p should not be equal to the value of q and should not be
equal to e. Next is the Diffie-Hellman wherein, we are use 3-digit also but we
can use a composite also for the values of g and p. The value for the small a
and b can be 1-digit number so it is very easy to solve, the conditions is that
the values of g and p should not be equal and also for both small a and b, it
should not be equal to 0 and 1. For the second meeting, we had discussed the
Physical Security and for the topics of Physical Security Concepts is somewhat
enjoyable because sir JP had discussed what should be the effect of a 99%
secured factor, and I enjoyed the failures of other high-tech security systems.
For the topic CPTED, was astounding because sir JP had given me an insightful
outlook for the natural security system that can be observed everywhere and he
expanded my knowledge about securing the environment. For the last meeting of
this week, sir JP had given us another exercise in accordance with the physical
security that was discussed the day before today/yesterday and the exercise was
very easy since our main topic is to assess the physical security of our
school, Asia Pacific College. For Week 12, we had a review of our topics in
Data Networks wherein sir JP is our instructor that time. The first 5mins of
the review, I felt my dignity being diminished and gradually took my
breath-a-way because I could not apprehend all the reviewed items. The funny
thing is that the class, in my perception, has the same state as I am wherein
all our knowledge was washed-up and cleaned carefully, but some of my
classmates can answer it based on what they remembered. This would be the last
learning log for Information Systems Security and I hope that you enjoyed my
post until the end of this term. --------------Sir Justin, magtatagalog na po
ako kasi medyo nauubos na po ang English ko dahil sa sobrang dami ng nilalagay
ko sa aking mga learning logs kung ito’y inyong napapansin. Dapat nga sir
magpopost pa ako ng pang Week 13 at 14 para lang magbigay ng huling paalam pero
bigla ka nalang nagsabi na hanggang 6 nalang ang learning logs at ayaw ko naman
magbida since marami akong mga avid readers globally ayon sa views na nakikita
ko sa aking history. Sir, salamat sa lahat ng mga pangaral nyo saamin at ang
mga oras na magkakasama tayo ay hindi hihigit sa anumang pilak sa
pinaka-malalim na dagat. Sana sir kung babalik ka ng APC siguraduhin mo lang na
bumalik ka bago grumaduate ang batch namin, siguro sir ok na yung January
diba? Dahil maraming humahangga sa inyong angking galing at pakikisama sa mga
estudyante, hindi tulad ng ibang mga propessor na wala nang ginawa kundi
isampal sa aming mga mukha ang kanilang natutunan at mga gintong medalya na
nakaframe sa kanilang bahay. MARAMING MARAMING SALAMAT TALAGA SIR! Dahil sa mga
turo at paalala niyo saamin sa loob ng 2 term ay binigyan mo kami ng malawak na
pag-unawa pagdating sa NETWORKING ahahhaah!!……..syempre biro yun sir, pagdating sa
teknolohiya. GOD BLESS SIR! SANA MAS MAGING SUCCESSFUL KA PA SA HINAHARAP! SANA
AY HINDI MAGBAGO ANG PANANAW MO SA BUHAY! STAY HUMBLE PO! TAKE CARE SIR! SEE
YOU WHEN I SEE YOU! J
Ginagawa mo dito? ^-^
Thursday, August 24, 2017
Sunday, August 13, 2017
Learning Log for Information Systems Security: Week 9 and 10 (Machine Project)
For these weeks, we are about to start our machine project because our group aims to get the additional points for the finals and we will strive hard for the final period of this term. But first, we should stick to the academics and the lessons discussed in our subject, we discussed about the topic Cryptography. Back in the Discrete Math subject in our flowchart, our class have encountered and study the nature of cryptography. At first, I could not really cope up with the background of the topic, but after a while of discussion and evaluation, I have now fully understand its nature. For this term to be honest, I have really forgotten the nature of cryptography, how it works. The good thing is I don’t have to review it all again, but I should have an outlook of the application of Cryptography in information security which is much more likely to conceptualized. Some of the terms in Cryptography that was discussed by sir JP like ciphertext, cryptology, and encryption was first discussed in my Discrete subject, and it provides confidentiality, integrity, identification, authentication, and non-repudiation. There are some things that is new to me, but I’m not really sure if this is really new to me because maybe I have recalled sometimes related to these sub-points: that is was used during ancient Egyptian times, that it have much laws, and the algorithms that it uses. Honestly, the algorithms part are very new to me and my mind was blown because of this new knowledge. So we should start with Symmetric Encryption, this uses one key to encrypt and decrypt, and there are more sub-points to be discussed but we only focus on the main one. Asymmetric Encryption, uses one key to encrypt and uses another key to decrypt. In a scenario, to send a encrypted file, you will have to use the public key of the receiver, then the receiver will decrypt the file using the receiver’s private key, simple as that. There are much more algorithm discussed by sir JP, but this are the only two that I 100% understand the other algorithms are almost there. The Week 9 ended because the resumption of I.T week is Thursday which is Infosec time, so no classes. For the two meetings in Week 10, a debate was exhibited and I would like to share our debate topic. Our motion is to adapt China’s internet censorship here in the Philippines, our arguments are much valued than the opposing so we won the debate. I wouldn’t share the content because copy rights maybe exhibited and faults may occur for the greater good, but once again we won the argument.
Subscribe to:
Posts (Atom)