Thursday, January 19, 2017

Learning Log 1


COMSEC
Here comes the first encounter with our new prof. We don't have any idea who's our prof in this subject. Some of my classmates mentioned some possible profs that will handle the COMSEC subject. Suddenly, Sir Justin came. Most of the class seemed to be happy. Sir explained to us everything from the requirements, grading system, projects, etc. He also told us that we are not having quizzes which made us very happy. For the second meeting since he was out, he left us an activity which is by group. We are asked to pick from issues 1 and 2. For issue 1, it tackles if Yahoo! was liable for the hacks or not. For Issue 2, it tackles if the Apple or FBI is correct. Our group decided to pick the Issue 1 and provided 3 arguments for us to defend our stand. Then in the third meeting, Sir discussed concepts related to ethical hacking. We differentiated hub from a switch, worm from a virus and most especially the steps of hacking such as Reconnaissance, Scanning, Gain Access, Maintain Access, and lastly Covering Track. And finally for our fourth meeting, Sir had a recap concepts that we encountered in our DATACOM subject. He pinpoint about the topologies. He describe the connection that exist in every topology. The difference of IP and MAC Addresses. Also the importance of backing up files.


INFOSEC
We are glad to know that Sir Justin is the one who will handle the INFOSEC class in our section. Sir Justin told us that what we will learn from the two subjects, we can apply it to the both subjects. For the second meeting since he was our prof in this subject, he gave us a group activity to be submitted. For the third meeting, first we defined what is the difference between Information Security and IT Security. IT Security is part of the Information Security. We also learned about the CIA which means Confidentiality, Integrity and Availability and sample situations that fall under the CIA. Also, we learned about the use of firewall. Before the class session ends, we are asked to do a simple case study that will be given in either odd or even number groups. And finally for our fourth meeting, he told us the importance of changing our passwords. Because if we used same passwords in every account that we have, it can be easily hacked by someone. Having a long password takes a lot of time for the hackers to know, so if we are about to change our password we make sure that it is not easy to guess.

>>Even if some concepts are new to me, I jot those concepts in my NB so if ever I scan my NB, I will remember those concepts. :)

No comments:

Post a Comment