Thursday, August 24, 2017

Learning Log for Information Systems Security: Week 11 and 12 (End is the Beginning of Something New. )

For the Week 11, the INFOSEC class taught by sir JP had 3 meetings overall and it should be 2 meetings per week and it is because of the Wednesday had a Monday schedule, the schedule of the INFOSEC is Monday and Thursday. For the first day of this week, sir JP had a review with cryptography, specifically in RSA and Diffie-Hellman Algorithm. I really enjoyed these two algorithms because of them were very challenging to answer and sir JP had given us an exercise about these two algorithms. The exercise was moderately hard because there are conditions starting with the RSA, the condition is that 3-digit prime number must be used for the value of p and q since the overall answer must be equal to 1, and the values must not be equal 0 and 1, the value of p should not be equal to the value of q and should not be equal to e. Next is the Diffie-Hellman wherein, we are use 3-digit also but we can use a composite also for the values of g and p. The value for the small a and b can be 1-digit number so it is very easy to solve, the conditions is that the values of g and p should not be equal and also for both small a and b, it should not be equal to 0 and 1. For the second meeting, we had discussed the Physical Security and for the topics of Physical Security Concepts is somewhat enjoyable because sir JP had discussed what should be the effect of a 99% secured factor, and I enjoyed the failures of other high-tech security systems. For the topic CPTED, was astounding because sir JP had given me an insightful outlook for the natural security system that can be observed everywhere and he expanded my knowledge about securing the environment. For the last meeting of this week, sir JP had given us another exercise in accordance with the physical security that was discussed the day before today/yesterday and the exercise was very easy since our main topic is to assess the physical security of our school, Asia Pacific College. For Week 12, we had a review of our topics in Data Networks wherein sir JP is our instructor that time. The first 5mins of the review, I felt my dignity being diminished and gradually took my breath-a-way because I could not apprehend all the reviewed items. The funny thing is that the class, in my perception, has the same state as I am wherein all our knowledge was washed-up and cleaned carefully, but some of my classmates can answer it based on what they remembered. This would be the last learning log for Information Systems Security and I hope that you enjoyed my post until the end of this term. --------------Sir Justin, magtatagalog na po ako kasi medyo nauubos na po ang English ko dahil sa sobrang dami ng nilalagay ko sa aking mga learning logs kung ito’y inyong napapansin. Dapat nga sir magpopost pa ako ng pang Week 13 at 14 para lang magbigay ng huling paalam pero bigla ka nalang nagsabi na hanggang 6 nalang ang learning logs at ayaw ko naman magbida since marami akong mga avid readers globally ayon sa views na nakikita ko sa aking history. Sir, salamat sa lahat ng mga pangaral nyo saamin at ang mga oras na magkakasama tayo ay hindi hihigit sa anumang pilak sa pinaka-malalim na dagat. Sana sir kung babalik ka ng APC siguraduhin mo lang na bumalik ka bago grumaduate ang batch namin, siguro sir ok na yung January diba? Dahil maraming humahangga sa inyong angking galing at pakikisama sa mga estudyante, hindi tulad ng ibang mga propessor na wala nang ginawa kundi isampal sa aming mga mukha ang kanilang natutunan at mga gintong medalya na nakaframe sa kanilang bahay. MARAMING MARAMING SALAMAT TALAGA SIR! Dahil sa mga turo at paalala niyo saamin sa loob ng 2 term ay binigyan mo kami ng malawak na pag-unawa pagdating sa NETWORKING ahahhaah!!……..syempre biro yun sir, pagdating sa teknolohiya. GOD BLESS SIR! SANA MAS MAGING SUCCESSFUL KA PA SA HINAHARAP! SANA AY HINDI MAGBAGO ANG PANANAW MO SA BUHAY! STAY HUMBLE PO! TAKE CARE SIR! SEE YOU WHEN I SEE YOU! J

Sunday, August 13, 2017

Learning Log for Information Systems Security: Week 9 and 10 (Machine Project)


For these weeks, we are about to start our machine project because our group aims to get the additional points for the finals and we will strive hard for the final period of this term. But first, we should stick to the academics and the lessons discussed in our subject, we discussed about the topic Cryptography. Back in the Discrete Math subject in our flowchart, our class have encountered and study the nature of cryptography. At first, I could not really cope up with the background of the topic, but after a while of discussion and evaluation, I have now fully understand its nature. For this term to be honest, I have really forgotten the nature of cryptography, how it works. The good thing is I don’t have to review it all again, but I should have an outlook of the application of Cryptography in information security which is much more likely to conceptualized. Some of the terms in Cryptography that was discussed by sir JP like ciphertext, cryptology, and encryption was first discussed in my Discrete subject, and it provides confidentiality, integrity, identification, authentication, and non-repudiation. There are some things that is new to me, but I’m not really sure if this is really new to me because maybe I have recalled sometimes related to these sub-points: that is was used during ancient Egyptian times, that it have much laws, and the algorithms that it uses. Honestly, the algorithms part are very new to me and my mind was blown because of this new knowledge. So we should start with Symmetric Encryption, this uses one key to encrypt and decrypt, and there are more sub-points to be discussed but we only focus on the main one. Asymmetric Encryption, uses one key to encrypt and uses another key to decrypt. In a scenario, to send a encrypted file, you will have to use the public key of the receiver, then the receiver will decrypt the file using the receiver’s private key, simple as that. There are much more algorithm discussed by sir JP, but this are the only two that I 100% understand the other algorithms are almost there. The Week 9 ended because the resumption of I.T week is Thursday which is Infosec time, so no classes. For the two meetings in Week 10, a debate was exhibited and I would like to share our debate topic. Our motion is to adapt China’s internet censorship here in the Philippines, our arguments are much valued than the opposing so we won the debate. I wouldn’t share the content because copy rights maybe exhibited and faults may occur for the greater good, but once again we won the argument.