Sunday, April 22, 2018

WEEK 6 - Use of Credible Sources

In WEEK 2 I stated that credible sources may come down to personal preference and the ability to prove the reference.I then went on to discus how I've been using Vice News over the years and like there stance and point of views, specifically on their technology reporting. Unfortunately, this is more of a news outlet and not much help for system analysis research. I've been using the following sources for this weeks assignments; 

https://www.tutorialspoint.com/system_analysis_and_design/system_analysis_and_design_overview.htm

Sunday, April 15, 2018

WEEK 5 - This Weeks Experiences

Oh, how I've come to know and love Harry and Mae's Inc. I have really gotten to know this companies insides and outs by using the same case scenario setup through the last couple of years. That being said, It's been great to be able to find newer and more detailed problems within this fictional company. Not that the work gets any easier, it just comfortable to know where I can start looking for problem's within this company's network system. Upon my graduation, oh, how I will miss you Harry and Mae's.

Sunday, April 8, 2018

WEEK 4 - Most Wanted Hacker

Evgeniy Mikhailovitch Bogachev was listed as one of FBI "most wanted.” What makes him different from the other members of this esteemed list is that he is a hacker. Not a man of violent crimes or a mobster who organized and induced a criminal conspiracy ring. No, that of a guy who used his keyboard as a gun in a good old fashioned bank robbery. He also used his weapon of choice to hold up every day citizens like you and me and often ransomed valued data more money instead of outright just stealing it. This guy was so good at what he does, he even ransomed information to a Massachusetts police station. This was all done with his creations of various infamous malware.



By using malicious software that "enslaves" computers and steals user names and passwords, the 30-year-old and his gang allegedly hacked into hundreds of thousands of banks accounts, emptying up to $7 million at a time from unsuspecting firms across America. Most were unaware that the attacks, from a program called GameOver Zeus, or GOZ, had even happened. A second program, known as "ransomware", would freeze victims' computer files and threaten to destroy them unless an online ransom was paid. It targeted not just businesses but ordinary home computer users, freezing precious online family photo albums and even children's school projects (Freeman and Mirovalev, 2014).



To this day, Evgeniy Mikhailovitch remains free and is still a criminal at large. With him being hailed a hero at home, it is unlikely there will be much cooperation from the Russian authorities for his arrest or extradition. American banks fear him and there is a $3 million-dollar reward for assistance in his capture.
WEEK 3 - This Weeks Experiences

With the pursuit of my Threat Modeling invention, comes the reality of actually seeing it in use in real world environments. It's safe to say that it is kind of eye opening in seeing other organizations using there own variations of threat models. This allows you to see how some companies do it better than others. Sometimes there not even really done at all. Knowledge is power in the way of protection, not only for yourself, but everyone who has data on these said networks.

Sunday, March 25, 2018

WEEK 2 - Credible Sources and Where to Find Them?

This may come down to personal preference and the ability to prove the reference. I've been using Vice News over the years and like there stance and point of views, specifically on their technology reporting. From research and reviews, I've come to trust this media outlet which is a big feat in these days. Finding credible sources is a hard thing to do with the current state of politically driven media outlets and the overly publicized "fake news." Vice News can be found through the following link: https://news.vice.com/en_us


Sunday, March 18, 2018


WEEK 1 - Introduction of My Blog

Hello, this blogs purpose is to explore viewpoints of current events regarding information security. These topics will be ripped from the headlines and articles produced from proven journalist sites. Fake news will be filtered out by establishing credible sources. Feedback and other opinions are always welcome. Our information is important and the safety of it can be bolstered by the spread of knowledge.