The Final Lesson log for this subject(at least thats what I heard.).
These whole week we were doing continuous lessons about physical security and other content about the whole security.
To be totally honest, I don't remember anything except for the physical securities because I like that part.
It was about how physical security is also important for our information security. The structure of the building until the possible materials used for the facility. We had an exercise about that with APC building. And I totally would say, the security of the APC s lacking. Yes because someone was able to hack the internet server, fire happens and stealing is uncountable. Well we could also say that it is also our fault for not consulting about it but in spite of that, the security aint that satisfying. How I wished that the APC could easily be changed just as the exercised, without any money limits.
Other than that We also had our final project. Our project was all about Snort(firewall). We had to port-scan and back-door detect using snort. It was not a big deal finding and implementing snort because inside Pfsense, there is packages, and one of them being snort. Seems that it was our first time presenting an implemented firewall from another firewall and our professor was impressed. What I didn't like about it was the process duration it took for me and Andrey Brian Buzon to install it. Yes, install. It is not even in the part of implementation of rules. It took us about 2 days with multiple reinstalling, searching for error solutions and changing some properties of the pfsense. It was tense, Andrey was almost about to give up when I was able to install the rules for the snort to run. After that was smooth, we were able to implement the port-scan and backdoor using the Linux Kali again. Presentation went fine so I was glad it finished within 30 minutes, because other groups had some issues with their presentation and took more than an hour to finish.
Friday, August 25, 2017
INFOSEC Lesson log 5:
These few weeks we've been assigned for another research(?)/debate. The topic was about Cybersex. Yeah like why do i even have to research about this, it is obvious that most of the people would say "no" to cybersex. That was my first impression about the topic, seems that I was wrong.
The only different thing with this debate was that there was a motion. Which is "Cybersex with consent should be legal." Many thoughts went through my head. Some are logical, and most being regional. So I had to think and research further just because our professor said,"without including regional purposes.".
I've research from site to site, videos to videos. I've focused my concept and content from a research done in USA. There were many information that i could obtain by the research that they did. The debate was done the next week, but unfortunately I was late due to the heavy non moving traffic in Makati-City. I've arrived in the classroom just in the time our professor were asking questions about the 3 content that my group stated. Even though I was late for the debate, I still had in mind what I had to answer and how to defend our content. Everything went well, I was able to answer the question coming from left and right. I wasn't able to say anything for my part of the content, but I rely on my group mates that they got my back. I just hope my grades are not so low.
The only different thing with this debate was that there was a motion. Which is "Cybersex with consent should be legal." Many thoughts went through my head. Some are logical, and most being regional. So I had to think and research further just because our professor said,"without including regional purposes.".
I've research from site to site, videos to videos. I've focused my concept and content from a research done in USA. There were many information that i could obtain by the research that they did. The debate was done the next week, but unfortunately I was late due to the heavy non moving traffic in Makati-City. I've arrived in the classroom just in the time our professor were asking questions about the 3 content that my group stated. Even though I was late for the debate, I still had in mind what I had to answer and how to defend our content. Everything went well, I was able to answer the question coming from left and right. I wasn't able to say anything for my part of the content, but I rely on my group mates that they got my back. I just hope my grades are not so low.
INFOSEC Lesson log 4:
For these weeks we were studying about cryptography and the ethics about hacking back. This week was also a week of SOCIT week. So the professor wanted us to go to the meetings(?) upstairs at the 12th floor auditorium. But I was just busy with Andrey Brian Buzon trying to finish the Midterm projects.
So after(?) the SOCIT week, we presented the Midterm project which was about malware in android devices. We were presenting how are the malwares able to penetrate the mobile cellphones firewalls and anti-malwares. After that we showed how the specific malware"false guide" works. It was quite interesting researching about the concepts that it uses to be able to create a malware inside the devices. But what was more shocking was the fact that the effected numbers of devices that were stated was only just this year 2017. So it is brand new and we don't have full information about the specific parts and authentications that it will do into the device. But for that part, we used the power of hacking OS"Kali" It has a built-in malware creating tools and codes. So what me and Andrey would have to do is just search in what codes we needed to run it.
After we presented I showed our professor the codes and the process of hacking my own device. The malware was able to hack in the call-records, contact-number, text messages and so on. He was amazed. Well even though it was hard to say how to completely protect your device from getting hacked/malwares, we were still able to show some solutions that would lessen the possibilities.
So after(?) the SOCIT week, we presented the Midterm project which was about malware in android devices. We were presenting how are the malwares able to penetrate the mobile cellphones firewalls and anti-malwares. After that we showed how the specific malware"false guide" works. It was quite interesting researching about the concepts that it uses to be able to create a malware inside the devices. But what was more shocking was the fact that the effected numbers of devices that were stated was only just this year 2017. So it is brand new and we don't have full information about the specific parts and authentications that it will do into the device. But for that part, we used the power of hacking OS"Kali" It has a built-in malware creating tools and codes. So what me and Andrey would have to do is just search in what codes we needed to run it.
After we presented I showed our professor the codes and the process of hacking my own device. The malware was able to hack in the call-records, contact-number, text messages and so on. He was amazed. Well even though it was hard to say how to completely protect your device from getting hacked/malwares, we were still able to show some solutions that would lessen the possibilities.
Subscribe to:
Posts (Atom)