Letter to Daughter
I know that puberty is an extremely confusing time in a young girls life. I know youre
going to hear a lot of adults say that, and websites/books about puberty start off with that exact
same sentence. I also know that it doesnt even rem
1) Public speaking is a part of everyones life. It is more common for some than others, as
well as dreaded by some and not all by many. It is what we use to outwardly speak to a
group of people and is tested in every-day life. In fact, when I worked at Bu
1 A data network that operates across a relatively large geographic area defines what type
2 The process of wrapping protocol information from one layer in the data section of another
A Data encryption
With the IoT in its infancy, Google has released its own software platform for developers. Martyn
Google recently announced the release of a new IoT (Internet of Things) platform that
utilizes the power of Android and will allow developer
A firewall can be hardware- based or software based.
A hardware- based firewall IS a dedicated system with
additi- I . . I . - n ed to monitor filter and log
traffic (Network- Based)
A software-based firewall is simply software that will
*- Hardware Locks
' ID Badges are commonly used to provide visual confirmation that
someone is authorized.
* Physical Access Logs & Lists can be used to verify exactly when
someone enters or exits.
' Door Access Systems are ones that only open after so
- The strictest of all access control models
Designed to be used by the Government
Military makes wide use of MAC
- Both subjects and objegs are given "sensitivity
When labels match, the appropriate permissions is
Example: Online Banking Login
You have forgotten your password and request a new
Bank will identity proof your identity by one of the following
Texting your registered cell phone number a temporary login PIN
E-mailing your register
ll Logic Bombs
- A logic bomb is a string of code embedded into
an application that will execute in response to an
- The event may be:
When a specific date is reached
A user launches a specific program or
Any condition the programmer decides on
I) The Disaster Recovery Planning Process
IL] Pop-up X
Exhaust il'l'uu.-I:\'M.ud' sis-.5. r:
ESP?- litiiwl e e. ['71:=|IE:@"=I'F~4"-'ll.e B IQ 9 I431 MEI a! l We"!
Disaster Recovery Program Steps
Phase I Data Collec
I! Wireless Networking Security Concerns
The practice of looking for a wireless network.
' Software such as NetStumbler can be used to locate a
wireless ngtwork even if the SSID Isnt broadcasting.
- Remember data emanates and can be reviewe
Greek Word: "Krypto" = Hidden /Secret
Core Features of Cryptography:
' Prevents unauthorized disclosure of data
' Ensure data isnt modified
' Used to validate sender with digital signatures
I! Designing an Authentication Strategy 1with Microsoft Teohnet
ur Enulronment 14.2 a for
Plan veiuate your
Create a environment
imputer Account foundation for
_ Create user
ICE Accounts mum,
I! Active Directory 1
I Local Selv-
I| All Servers
il le and 51:
Select server ro Ea,
Add features that due quuiIe-d for Active Directory
' ' 1
Domam Senna-s. in"
V9. twat Imus Mme Dum Damam 5% lm M ii en
- Physical & Logical Controls
Physical security includes implementing different
access control methods with technology you can
touch. Physically locking down the equipment and
securing the building.
Logical security methods include those elements
Access Control Lists (ACLs)
Used to specifically identify what is allowed and what is not allowed.
An ACL can define what is allowed based on permissions or based on traffic.
ACLs typically operate using an implicit deny policy.
- Access Control Basics
Access control protects against a wide variety of
Unauthorized Access 4-
Unapproved Modification of Data
- Lack of Data Confidentiality R
CIA triad is the cornerstone of cyber security and