Ransomeware

U11 Cyber Security

By LewisG
  • U11 Summary

    U11 is about learning the various methods that are used to infiltrate computer systems and how these attacks are prevented. To know about these attacks fully, it is important to also know what makes them possible.
    another part of U11 is learning how to prepare countermeasures to various attacks and deciding which is the most effective.
  • Aim 1

    aim 1 is to know about the various parts of the unit, being able to describe them.
    to reach this, it will be important to understand all of the units lessons, and complete the tests after to know what to focus on.
  • Aim 2

    to reach aim 2 it is important to be able to use the knowledge that was needed in aim 1, this means that it will be important to understand the unit instead of just remembering it.
    to reach the understanding needed it will be important to experience virtual scenarios that will help with knowing what to use where.
  • Aim 3

    to reach this aim it is important to know how to analyze data. this means that it will be important to look at scenarios where data needs to be analyzed and observe the methods used carefully.
    it will also be important to attempt to analyze data to get experience with it.
  • Aim 4

    to reach aim 4 it is important to be able to evaluate the various methods of security and justify the decision. this requires knowledge of the various differences between the different methods of combating attacks, and the different types of attack.
  • Aim 5

    aim 5 is about being able to keep a network secure and deal with security issues as they happen, explaining the reasons for the actions.
    this will be the most difficult, as it requires the largest range of knowledge including all of the knowledge required in the previous aims.
    it will also be vital to practice this, as it will be easy to make mistakes.
  • Lesson Recap

    in this lesson i have learned:
    -different certification types
    -different security threats
    -dangers of stolen information
    -mobile device vulnerabilities
    -IoT dangers
  • Last Lesson

    last lesson we:
    -learned about the unit
    -learned the different cybersecurity roles
    -learned about the different types of hacker
    -learned about big data and data domains
    -learned about IoE
    -learned some different types of attack
  • Last Lesson

    last lesson we learned:
    -about the different hacker types
    -different types of stolen information
    -risks of the BYOD policy
    -how hackers can infiltrate networks through unsecure IoT devices
  • This lesson

    this lesson we learned about:
    -different ways of transporting data
    -hashing algorithms
    -the AAA plan
  • Last Lesson

    last lesson we learned about:
    -AAA
    -the different devices used to implement AAA
    -hashing algorithms
    -ipsec
    -different data transport types
  • This Lesson

    this lesson i learned about:
    -different ways of getting information
    -different malware types
    -different hack types
  • Last Lesson

    last lesson we learned about:
    -different types of malware
    -different ways of getting information from people
    -different ways of tricking people
  • this lesson

    this lesson we learned about:
    -difference between standard and extended ACL
    -different types of encryption (public and private keys)
    -one-time-passwords
  • last lesson

    last lesson we learned about:
    -different encryption types
    -different examples of encryption algorithms
    -ACLs
  • this lesson

    this lesson we learned about:
    -different database attacks
    -hashing algorithm sizes
    -digital signatures
    -RSA services
    -pigeonhole principle
    -authentication technologies
    -steganography
  • last lesson

    last lesson we learned about:
    -hashing algorithms
    -digital signatures
    -digital certificates
    -pigeonhole principle
    -steganography
    -authentication technology
  • this lesson

    this lesson we learned:
    -The 5 9s
    -Single points of failure
    -system resilience
    -fault tolerance
    -defense in depth
    -raid variants
    -spanning tree
  • This lesson

    this lesson we learned about:
    -AAA server configuration
    -FTP server configuration
    -SMTP & POP3 server configuration
    -NTP server configuration
    -DNS server configuration
  • Last Lesson

    last lesson we learned:
    -the 5 9s
    -RAID
    -system resilience
    -Spanning tree
    -failure points
  • last lesson

    last lesson
    last lesson we learned about:
    -how to configure an FTP server
    -web server configuration
    -mail server config
    -configuring DNS servers
    -NTP servers
    -configuring AAA servers
  • this lesson

    this lesson
    this lesson we learned about:
    - how to send emails
    -how to use FTP
    -how to use telnet to remotely access a router
    -how to access a router using SSH
  • last lesson

    last lesson
    last lesson we learned about:
    -how to use email services
    -how to use telnet to configure a router
    -how to configure a router with SSH
    -why SSH is more secure than telnet
    -why companies opt to block telnet connections
  • practice exam notes

    practice exam notes
    Exam:
    -revise internal threats (Topic 1)
    -revise external threats (Topic 2)
    -revise system vulnerabilities (Topic 4)
    -practice laying out the activities
    -time needs to be spent reading everything
    -notes need to be made
    -every small detail is useful
    -I need to ensure that I can complete all of the prompts in a detailed way, as they follow on from each other
    -I need to practice managing the time for the different tasks
  • last lesson

    last lesson
    last lesson we:
    -looked over a past exam paper
    -attempted to complete some of the work from the paper
    -listed everything that I needed to focus on
    -planned to look into the areas that required attention
  • this lesson

    this lesson
    this lesson we learned about:
    -lab
    }
    -the importance of hashing in verifying file integrity
    -the importance of keeping track of which website is being visited, preventing hacking attempts from succeeding
    {
    -past paper
    {
    -what another of the past papers is about
    -which themes of the exam papers are constant and which change
    -what I need to revise to be capable of completing it
    }
  • last lesson

    last lesson
    last lesson i:
    Facts:
    {
    -learned about the importance of file integrity
    -learned about how websites can be made with malicious intent
    }
    Emotion:
    {
    -this topic is easy to understand
    }
    Benefit:
    {
    -i will be better at understanding file security
    }
    Ideas:
    {
    -i could think of more ways to avoid malicious websites
    }
    Planning:
    {
    -i will look at the lab again today, ensuring that everything that i missed is completed
    }
    Judgement:
    {
    -some of the facts about file integrity can be difficult to understand
    }
  • this lesson

    this lesson
    this lesson i:
    Facts:
    {
    -configured different types of wireless security
    -researched issues with wireless security
    }
    Emotion:
    {
    -I think that this interesting
    }
    Benefit:
    {
    -this will help me to further understand how to secure wireless networks
    }
    Ideas:
    {
    -I should recommend WPA2 when WEP is mentioned
    }
    Planning:
    {
    -I will continue to look at wireless security and its problems
    }
    Judgement:
    {
    -WPA2 is the only security type that people are likely to use, making the others not important to know
    }
  • last lesson

    last lesson
    last lesson i:
    Facts:
    {
    -worked on the lab 4
    }
    Emotion:
    {
    -i found it easy
    }
    Benefit:
    {
    -it helped me to learn about the importance of file integrity
    }
    Ideas:
    {
    -i could use this in my assessment
    }
    Planning:
    {
    -i will not need to review this any time soon
    }
    Judgement:
    {
    -it could become difficult to remember all of the details in the future
    }
  • this lesson

    this lesson
    this lesson i:
    Facts:
    {
    -i worked on lab 5
    }
    Emotion:
    {
    -i found it easy
    }
    Benefit:
    {
    -it has increased my understanding of the process of setting up networks
    }
    Ideas:
    {
    -i should recommend WPA2 for security (possibly WPA3)
    }
    Planning:
    {
    -i will not need to re-visit this any time soon
    }
    Judgement:
    {
    -understanding how the different security measures work can be confusing and difficult to remember
    }