network security

37
7.6K followers

This is an area that's near and dear to my heart! I completed a course of study in Network (cyber) Security part-time from 2004-2010. I took this primarily for edification but was surprisingly able to use it in obtaining a security analyst position with Northrop Grumman.

The course covered topics mentioned in this informational and concentrated on the threat structures. Discussed were Botnets, social engineering, worms, viruses, phishing attempts, general malware and other components of the cyber threat landscape.

I used a program called Arc Sight which assisted in targeting infected URL's. I found that streaming media was especially susceptible to malware infection. Both aural and visual apps and media were intensively susceptible to infection.

Much of the information covered here is traditional but some is germane to the times since I completed my course.

  • Threat 1 - social engineering - We are our own worse enemies. Do you use a shredder to prevent such activities as dumpster diving where addresses can be pulled from trash? In a work environment, Do you secure doors behind you to prevent piggy backing (some one following behind you) before the door is shut?
  • Threat 2 - internal threats- Largely caused by disgruntled employees or ex employees with covert knowledge. Many people develop a chip on their shoulders as a result of perceived or real offenses. A reason for proper vetting and examination of security clearances. 3 out of 5 employees that fall into this category in 2014 is appalling!
  • Threat 3 - bring your own device (BYOD) - Especially in the mobile device era this is rampantly allowed by many employers This sort of casual insertion of your own device has grown. I was amazed at current in flight travel as I learned that "airplane mode" means your wireless mobile device is attuned to friendly in flight frequencies. Nothing is plugged in anymore. You carry it on board with you.
  • Threat 4 and 5 greater numbers and methods of attacks and the special category of botnets. Infection of large numbers of servers is called pharming after the server farms or clusters being infected

This should give an impression of the world that Site Support goes through. Also, an appreciation of the type of threat structure that is dealt with here at Wealthy Affiliate.

Login
Create Your Free Wealthy Affiliate Account Today!
icon
4-Steps to Success Class
icon
One Profit Ready Website
icon
Market Research & Analysis Tools
icon
Millionaire Mentorship
icon
Core “Business Start Up” Training

Recent Comments

16

This was a real eye-opener. I was aware of cyber crime both on a personal level (identity theft) and large scale (Equifax) but certainly have a new appreciation for the safety we are provided through WA.
Thanks for reminding us to be vigilant with our information.
Kyle Ann

Cybercrime is a real threat. Thank you for calling our attention to it. We must be vigilant!

Everyone should be aware of this info.

Are we safe?

A very interesting blog.

Derek

Thanks for keeping us aware of this.

Hi Mike

This is extremely informative. Thanks! It was good to read it and know that we should all be Network Security Sensitive and always be alert.

Thanks

Best wishes

William

Mike,
Excellent blog. It's so nice to know that I'm doing the right things to protect my data. Your blog just gave me a refresher course on what I have been doing routinely for years. Thanks for refreshing my memory on why I picked up those habits and maintain them in my retirement years, especially since I now spend so much more time online.

Dell

Hi MIke I Listened to an ex Hacker now an IT Cyber Security Consultant
Speak at a large TED X Talk and Stunned and Shocked the audience of Executives how all were so Naïve with regards to the Lack of IT Security .I have seen 4 Documentaries IT Crime and Hacking so your topic is a big Favourite of mine . Thank you for sharing .Much appreciated
David

My pleasure David!

Thank you, Mike, for being such a great help in informing us of these things

My pleasure!

See more comments

Login
Create Your Free Wealthy Affiliate Account Today!
icon
4-Steps to Success Class
icon
One Profit Ready Website
icon
Market Research & Analysis Tools
icon
Millionaire Mentorship
icon
Core “Business Start Up” Training