Friday, June 30, 2017

INFOSEC Lesson log 2:

Despite the fact that i only attended 2 meetings in this 2 past weeks, we learned about some reality of the daily security and some models. To tell the truth i do not remember about the topic and the details. This is because me and my other team mate(Buzon) was focusing on the project that our professor has given us.
We are 4 in a group and we needed to find out how it works and what it does and some resolution for it. Our topic was about the mobile malware. We had to first think of which console we would use(android/apple). After this we decided to choose a malware that is recently been discovered and plus, difficult to solve. We search bunch of malware such as pop-up malwares to data deleting malware to even SMS malwares. We discussed on whether we pick one that is still active in the society or the malware that is giving a big effect to the society. We decided to use "FalseGuide" as our malware to research about. As we were researching we learned that it is a malware that camouflage itself into a game guide and creates malware into the android system device. Now we are searching on how it actually works into the system.

Thursday, June 15, 2017

INFOSEC Lesson log 1:

This 2 weeks of our Information Security we have learned valuable things that not only would be related to our daily lives but also how to be secure with it and to identify the threats or in other words as our professor likes to say it being smart with the objective. 

The 1st thing that this subject told me about was the difference about the information security and the IT security. At a glance some people would say it is totally different. It was difficult for me for IT is literally Information Technology Security and it seems for me to be the same with information Security. But as the professor explained that IT is focused on Hardware and Software technology I figured out that they are a totally different thing.

We also learned about the differences between Information Security, confidentiality, integrity, and availability.  The difference of the situations can make a big problem simpler to solve. other than that there were studies of the firewall, security principle, types of privilege, duties, types of access control, and other authentications. Each studies are interesting giving me the knowledge and opportunities that can help me in near future.

What I enjoyed most in this Lesson is always the group project. The professor gives the group a problem and we as a group should think of solutions to solve it. I enjoyed this not because i was easily think of a conclusion by the things that i just learned but the point that sharing your thoughts with the group mates and also seeing things by their perspective of the problem.