Last but not the least

Five blogs I've wrote here in my blog, all of those six blogs was all about Information Security.
And for now, for the last six blogs as one of the subject requirements I will make sure that no more "hugot lines" you will read for the next paragraphs. 

For the last two weeks in our class, all topics have been spread out to the class as we were informed by our respected Professor Justin Pineda. He shared all about security measures that relates not just in our subject manner but also relates to everyday lives we encountered each day. As Sir Justin Pineda asked this question, "If someone hacks your system, will it be okay if you will hack him back?" In real life, its the same scenario as someone hurt you whether it is intentional or not, will you be that kind of person that will fights back just to get the revenge from that hacker or attacker? 


This is the topic discussed for the last two weeks.
A subject matter that tackles the importance of pysical security. As one line comes out like this

"No matter how good your network or application security tools are, data
are still at risk if there are no good physical controls available."

We also presented for this week as our machine project. The project is about one tool namely Honeypot (honey pot).

A honeypot is a computer system that is set up to act as diversion to the cyber attackers and to detect unauthorized access to information systems. Honeypot consists of a computer, applications and data that simulate the behavior of a real system that appears to be part of a network but is closely monitored. 

Viewing and logging this activity can provide an insight into the level and types of threat a network infrastructure faces while distracting attackers away from assets of real value.

Comments

Popular posts from this blog

18 - Anti-Smoking Campaign!

15 - Friendship means a lot!

Security has own Model too