Posts

Showing posts from December, 2022

Week 3 Posting - IPS/IDS/HIDS

 This week’s blog will cover week 3 for BSIT380, within this week IDS and IPS were covered on how they work and are different from each other. IPS or Intrusion Protection System will locate traffic and will use predefined rules to try to block or redirect attacks to a DMZ. With IDS or Intrusion Detection System an alert goes off and the alert is typically passed to either a log or a person, a IDS works best when manual intervention is typically required or in test environments to just get a better picture of the network. In chapter 6 host-based security was covered as well as device hardening, patch management, antivirus, anti-malware, and HIDS. With anything when it comes to changes it is a good idea to log and set a procedure for said changes. 

Week 2 Posting - Attack Vectors

  Network security is a growing concern for organizations of all sizes as attackers become more sophisticated and determined to get into a restricted network . While virtual ized and appliance-based tools can provide security for most applications and services , it is important to remember that no single tool can protect against all known threats . It is essential that organizations have a multi-layer security plan that is tested and checked annually. Networks that is deemed secured should still include regular monitoring , management , and updates . This week 's chapters provide an excellent overview of the tools and policies needed to respond to potential network security threats . It is important to remember , t hat security is an ongoing process and regular updates to tools and policies are necessary in order continuously secure an organization 's structure network . With the ...

Week 1 Posting - Intro

 Hello! My name is Jake and I am a transfer student from Southeast Tech located in Sioux Falls, SD. I have my associates in IT security and am interested in going further with Bellevue. I have worked with system hardening during my time in the US Department of Defense as a Cyber Systems Operator and a Cyber Defense Operator. During my time in the Air Force, I worked with a program called Stigs and stig viewers. https://public.cyber.mil/stigs/srg-stig-tools/ is a good site to see what the US DoD thinks is a vulnerability and should be changed, the list is not all-encompassing to prevent attackers from knowing what systems were changed and what portion was changed.  I am eager to get started and share what lessons I will learn this semester.