Ferreira Logo

Ferreira's Gentle Sailing Web Site

BCC Logo Home CIS132 CIS134 CIS158 CIT150 CIT250 CIT251

Help

CIT150 - Network Security

Security Image
Welcome to Security+






Returned Assignments

Assignments:

October 24, 2017, 8:30 am

Projects:

October 24, 2017, 8:30 am
Look Around

Everything that you need to know about this course is on this site.  This includes policies, assignments, quizzes, and much more information. Look around and get to know it well.

This course will also make use of eLearning. Please make sure you visit it regularly.


Notices

CIT150 Web Updates

Date change has been made for Testing. Please review. < 15-Nov-2017 >

Microsoft Imagine

Microsoft Imagine (formally Dreamspark) accounts have been created for CIS134 Students. Students should have receive an invitation to Microsoft Imagine via Office 365 BCC email. The login page for Microsoft Imagine is available on CISWEB under the Software menu option. If you have not received notification, please contact Eric Oldford at eric.oldford@bristolcc.edu to have your account activated.

Essential Security Certificates

In his article, Essential certifications for smart security pros, Roger Grimes presents a list of sought after security certifications and makes a case for each.

The Equifax Breach

In his article, The Equifax Breach: What You Should Know, Brian Krebs begins with " It remains unclear whether those responsible for stealing Social Security numbers and other data on as many as 143 million Americans from big-three credit bureau Equifax intend to sell this data to identity thieves. But if ever there was a reminder that you — the consumer — are ultimately responsible for protecting your financial future, this is it. Here’s what you need to know and what you should do in response to this unprecedented breach."
Click on the link above to read the entire article.

Supply-Chain Security Problem

In his article, Software Has a Serious Supply-Chain Security Problem, Andy Greenberg begins with "The warnings consumers hear from information security pros tend to focus on trust: Don't click web links or attachments from an untrusted sender. Only install applications from a trusted source or from a trusted app store. But lately, devious hackers have been targeting their attacks further up the software supply chain, sneaking malware into downloads from even trusted vendors, long before you ever click to install."
Click on the link above to read the entire article.

Cyber Resilience

In their article, Why Cyber Security Is Not Enough: You Need Cyber Resilience, Matthew Goche and William Gouveia presents rational and plan for Cyber Resilience. They begin "It’s true. Cyber attackers have an edge on you. Just look at recent incidents of credit card information being stolen from Target and SnapChat users' names and cell phone numbers being published online."
Click on the link above to read the entire article and/or get the 4 steps to cyber resilience below.
        4 Steps to Taking Control with Cyber Resilience"

Hottest Job in IT

"In a tight job market, security pros are paid well, rate job satisfaction high, and will make a move for money, according to Survey: With all eyes on security, talent shortage sends salaries sky high.
Digging into the data, we find that information security manager is the hottest job in IT"
Salary Survey 2016: How does your compensation stack up?
        By Amy Bennett, CSO, InfoWorld


Encryption is not the enemy

"Our politicians help the terrorists every time they use fear as a campaign tactic.... The surest defense against terrorism is to refuse to be terrorized. Our job is to recognize that terrorism is just one of the risks we face, and not a particularly common one at that. And our job is to fight those politicians who use fear as an excuse to take away our liberties and promote security theater that wastes money and doesn't make us any safer. " Security expert Bruce Schneier as quoted by Caroline Craig, InfoWorld - Read More

Take a look. What do you think? Come prepared to discuss.

After Paris: Liberté demands unlimited encryption

"The neocons are at it again: After the tragedies of the terrorist attacks in Paris last Friday (and Beirut the day before), they're arguing that governments need to be able to access all communications from everyone, purportedly to protect us from future terrorist attacks" By Galen Gruman, InfoWorld - Read More

Take a look. What do you think? Come prepared to discuss.

NSA uses the vulnerabilities to make its own cyber-attacks

"The U.S. National Security Agency, seeking to rebut accusations that it hoards information about vulnerabilities in computer software, thereby leaving U.S. companies open to cyber attacks, said last week that it tells U.S. technology firms about the most serious flaws it finds more than 90 percent of the time. -- " Reuters - Read More

Take a look. What do you think? Come prepared to discuss.

Revealed: how US and UK spy agencies defeat internet privacy and security

"US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden." The Guardian - Read More

Take a look. What do you think? Come prepared to discuss.

Text

Security+ Guide to Network Security

5th Edition
by Mark Ciampa
Course Technology, Cengage Learning
ISBN 13 : 978-1-305-09391-1
  ISBN 10 : 1-305-09391-7


Cengage Brain .



Remember, this is a dynamic website.  Visit often.