Home
My name is Davion Ayers and I am majoring in Cybersecurity and I will be graduating in Spring 2023. I made this website for my CYSE 200T class. I’m looking forward to a fun filled semester welcome to my page.
This is my E-Portfolio
Cybersecurity framework is a set of the best practices that a company should follow to deal with its cybersecurity flaws. Assessing the risks should be the first thing a company should do when setting up the framework that way they can know what they’re dealing with. Framework is really an extra layer of security. First the company needs to identify the work environment and figure out what kind of risks exist. Secondly, they need to protect or in other words they need to contain those problems with the security that are present. The third thing the company needs to do is detect. Detect is important because if there are no employees to detect that a problem exists in the cybersecurity than how will we be able to fix it. Next, we must respond to the problem that we identified because if we don’t respond to the problem then it will continue to exist. Recover is the last thing to do in a security compromising event. You must go through the recovery process because you need to bounce back from the lost data and secure yourself from any further flaws. The recovery process can honestly be the longest because you must put yourself in the shoes of the attackers and things of ways you would perform attacks. Cybersecurity attacks are on the rise and framework really helps companies prepare and try to combat cyber attacks the most effective way possible. If there are flaws in the security then there’s no telling if recovery will even be an option because an advanced enough cyber-attack could destroy a company for good.
Discussion Board 2
1. Briefly define each of the three members of the information security triad.
There are 3 members of the Information security triad, they are Confidentiality, Integrity, and Availability. Confidentiality is associated with secrecy and encryption keys. Confidentiality means organizing the information and making sure that it doesn’t end up in the wrong hands. Integrity is a guarantee that the data won’t be tampered with or edited the wrong way. Availability means that the information is there when the authorized users need it.
2. What does the term authentification mean?
Authentification is the verification process that determines whether the user trying to access the information is in fact who they say they are.
3. What is multi-factor authentification?
Multi factor authentification is just like regular authentification except it has a few more steps and processes that it uses to determine whether or not the user is in fact who they are portraying to be.
4. What is role-based access control?
Role-based access control is an access control method that assigns permissions to users based on their role within the organization.
5. What is the purpose of encryption, and fundamentally how does it work?
Encryption is the process of scrambling text that can be read and only making it readable to the person who has the encryption key password.
6. What is pretexting and how does it represent a threat in the Cyber security landscape?
Pretexting is researching the target before the attack happens. Pretexting represents a threat in the Cybersecurity landscape because the information gained from the victim is used for manipulation and political gain or wealth gain.
7. What’s the point of backups & what are the components of a good backup plan?
Backups are a way of preventing a data loss in a company. A good backup plan should have a state of the art disaster plan and you shouldn’t need internet to be able to restore all of your data back. With a nice backup plan your company wont ever have to worry about starting all over from a total loss.
8. What is a firewall?
A firewall is a security device that is in the hardware or software of the computers. It watches out for attempts of when intruders try to access your operating system and it blocks unwanted incoming traffic and sources that it doesn’t recognize.
9. Discuss various types of Firewalls.
Packet filtering firewall- it is the oldest type of firewall. It creates a checkpoint at the traffic router and makes it so that only verified ip address can get through.
Application Level Gateway Firewall- It is known as a proxy firewall. It is more secure than a Packet filtering firewall.
Stateful Inspection Firewall- they are slower than other firewalls.
10. What does the term physical security mean and how does it apply to Cyber Security?
Physical security is measures designed to make sure the physical protection and coverage of IT assets like facilities, equipment, personnel, resources and other properties from damage and unauthorized physical access. It applies to Cybersecurity because if the computers are protected they will be compromised and then there won’t be a need for cyber security because the computer will be hacked and crashed.
About Hacking
Hackers are very dangerous, and they prey on computer users like us. Hackers can use viruses to gain full access to a user’s computer. When you are surfing on the web you should only click on websites that are secure and trusted. If you do not know anything about the website do not go to it. Hackers will steal your personal bank information and will not think twice about doing it. Hackers are very dangerous criminals and they will fish for your tax information so they can put things in your name. There are effective ways to protect yourself from hackers. You can use Anti malware software to help you get warnings about potentially dangerous software that you are attempting to install onto your pc computer. Sometimes big time hackers will install viruses into downloadable computer applications so that when you download the application and install it and run it the application will send all of your computer information to their computer. When they get your information you won’t know that they have it until you start noticing random transactions on your bank account as well as weird mail notifying you about things in your name that you did not sign up for. Hackers do not only hack computers they hack cell phones and tablets as well. Anti virus software can help you get warnings about potential attack attempts. Once a hacker steals your personal information they will have it for good so you need to do your best to only visit websites that you know about and be careful what you sign up for.
Source: Hacking | What is Hacking? | How do Hackers Hack? (malwarebytes.com)
Starting a Small Bussiness
When you are starting a small business you need a good amount of money. The first thing you need to do is work on getting your software then you need to figure out a way to backup your information as well as keep it secure. Security is everything in a business no matter if it’s a small business or a large business. A small business may be small but it can definitely have a large impact on the world. There are a ton of small businesses that have a good impact the impact is just as large as the booming businesses. A small business can make a lot of money and be well known it is all about strategy. With a good strategy your small business can be on top of the world. For a small business you will need to hire workers and you will need insurance for them. Some of your employees will be working from home so you may need to provide a data hotspot and a company laptop so that they be able to do the company’s work from the comfort of their home. You will need insurance on the computers in the company and you need to be prepared to pay rent for the building that you will be conducting your business in. When you are calculating how much money you will need to start your small business you need to add the employees payroll to your list. You have to pay good money so you can keep your workers happy and not give them any reasons to take from the company or sabotage the company’s property or anything.
Scada Systems
Scada systems process network data and help keep things secure. There are Scada systems everywhere these days. They are in restaurants, industrial plants, grocery stores, and many more places. Scada systems deal with network problems because they end up causing your server to go down. It also controls the equipment so that everything works the way it’s supposed to. Scada systems are automated, so you don’t have to worry about any human errors when it comes to keeping everything automated and machine oriented. Scada systems handle operations that humans would make tons of errors working with. Scada system is ultimately where the data meets operation. The main goal of the system is to collect industry data and protect it and keep it safe from anything that would cause the network to experience down time. Scada is also incorporated into the train and railing systems. Also, it is in the signaling systems. Scada increases the life of equipment as well. It also processes real-time data that humans would get confused by. Data that Scada processes would give humans a hard time and it would be very tedious for a person to manage company data. Scada makes it easier to manage data. Machines need Scada so they can run smoother and keep the cyber ends of things flowing smoothly. Telecommunications are also managed by Scada so that the telephones in companies that are hooked up to the ethernet can run smooth without running into problems and cause down time for the network servers. There would be a lot of vulnerabilities without Scada being incorporated into almost everything in the corporate industries.
Cyber Stalking
The changes in technology have made it easier to connect with people on the internet. Everyone should know the difference between appropriate and inappropriate behavior on the internet. If you are trying to talk to strangers on the internet do not send back-to-back messages send one message and if you don’t get a response leave it alone because they are not interested. There are many ways to report inappropriate behavior on social media. There is a report button and once something is reported to the social media developers, they will investigate it, and they may ban the user from using the site. The ban may last for 30 days for the first offense and the second offense may be more penalizing. 30 days is a harsh punishment, but it is enforced so that violators can realize that cyber stalking is a very serious thing. Technology is so advanced that you can connect with any person who is on there whether you know them or not. Technology’s advancement should not be taken lightly because once the social sites ban you in a serious enough manner you may not be able to use any social media sites to connect with anyone. They will stop you from signing up for a new account based on your banned email. Cyber harassment is very out of hand and none of the social media sites do not take it lightly it is very serious, and you should avoid talking to people that you do not know personally.
The growth of technology is very rapid and it has happened right before our eyes. Technology has grown so much in the last 10 years. Technology is so advanced that you can do almost anything on your phone instantly. Technology has not always been as good as it is now but the technology experts have made it so easy and fun to use. Phones can do anything you can watch TV on your phone as well as send emails effortlessly. The best thing about technology growth is that it is advancing every single day that goes by. Computers are more advanced and helpful than they have ever been at any time in history. Computers can do anything you can use a computer for accounting, company management as well as organizing important files for the company’s employees. Computer have not always had a built in webcam but now they do. Not too long ago you had to buy the webcam separately for laptops and desktop computers. Lately the technology companies created android powered landline phones with touch screen capabilities along with a screen that is up to 7 inches. Home phones have never been as advanced as they are now. Even TVs are able to surf the internet and download fully functional applications such as Youtube and Amazon prime TV. The Smart Tv’s are so advanced that you can use the built in web browser to surf the worldwide web as well as do anything you need to do on google. Technology has advanced so much in a short period of time. Yes I agree with the writer because the writer appears to be informed on the subject matter as well as educated in the Cybersecurity world. The technology advances has made my life so much easier because there are a bunch of apps I can download to help me succeed in school with ease.
Growth of Technology
The growth of technology is very rapid and it has happened right before our eyes. Technology has grown so much in the last 10 years. Technology is so advanced that you can do almost anything on your phone instantly. Technology has not always been as good as it is now but the technology experts have made it so easy and fun to use. Phones can do anything you can watch TV on your phone as well as send emails effortlessly. The best thing about technology growth is that it is advancing every single day that goes by. Computers are more advanced and helpful than they have ever been at any time in history. Computers can do anything you can use a computer for accounting, company management as well as organizing important files for the company’s employees. Computer have not always had a built in webcam but now they do. Not too long ago you had to buy the webcam separately for laptops and desktop computers. Lately the technology companies created android powered landline phones with touch screen capabilities along with a screen that is up to 7 inches. Home phones have never been as advanced as they are now. Even TVs are able to surf the internet and download fully functional applications such as Youtube and Amazon prime TV. The Smart Tv’s are so advanced that you can use the built in web browser to surf the worldwide web as well as do anything you need to do on google. Technology has advanced so much in a short period of time. Yes I agree with the writer because the writer appears to be informed on the subject matter as well as educated in the Cybersecurity world. The technology advances has made my life so much easier because there are a bunch of apps I can download to help me succeed in school with ease.