Episodes

  • Basic Principles of Information Security
    Aug 31 2021

    Information is the lifeline of an organization. Think about what blood does to a human being. That is actually how the data and information that flow through our network is importance for our organization. Data and information are essential in our private lives as we monitor our homes using remote cameras. We want to know where our kids are, what they are doing, or where they are hanging out. We want to know where our vehicles are parked and the things happening around them. So, the information we are tracking must be secure because it can be compromised if it is not secure. And if it is compromised, it would not serve the purpose for which we need the data or information.

    --- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
    Show more Show less
    19 mins
  • Identifying the IT Infrastructure for IT Security
    Aug 25 2021

    As you can see in today's world, so many devices are now classified as a computer. In the past, people think that the computer is the big bulky device you see on tables in many offices and organizations. You are right. Those devices are still considered computers. However, many other devices are now behaving and acting the same way those computers act. There are several devices that make up the Information Technology infrastructure for a business or an organization, even for individuals. In today's world, people store their files and their digital assets in the cloud, and some use data centers. Some companies manage data in the cloud. IT infrastructure could be your computers, your tablet, your PC, or even your smartphone. Then there are the servers which are used as storage facilities. You think about the various devices you use for communication as computing infrastructure. Also, information technology is what we used to carry out or perform job tasks...More

    --- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
    Show more Show less
    21 mins
  • Use Defensive Cybersecurity to Mitigate Cyber attack
    Jul 28 2021

    It is essential to understand what could go wrong in a system and to use mitigation action to protect the system from potential threats. In recent weeks you may have heard of an incident that explained why there is a need to take a defensive approach to protect your digital assets and infrastructures. The incident is that of Kaseya. Wired.com reported that the Kaseya was warned by the Dutch Institute for Vulnerability Disclosure that there was a potential vulnerability in its system. In this case, Kaseya did not ignore the warning, but Kaseya did not move first to patch up the exposure...More

    --- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
    Show more Show less
    11 mins
  • The Human Factor in a Ransomware Attack Part-2
    Jun 17 2021

    Kaspersky Lab conducted a study to determine what role employees play in a business's fight against cybercrime. The study used over 5,000 businesses around the globe and found out that (52%) of the businesses surveyed believed they are at risk from within and that their employees either intentionally put the businesses at risk or are put the businesses at risk through carelessness or lack of knowledge.

    The question that comes to mind after reading that report is why employees are responsible for so many security breaches? Is it fair or proper to say that employees are lazy? Or that they do they just not care what risk they expose their employer?

    What do you think of the result of that report?

    --- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
    Show more Show less
    11 mins
  • The Human Factor in a Ransomware Attack Part-1
    Jun 9 2021

    Ransomware is a type of malware that creeps into a network, scans the network to identify targets, and then uses encryption to seize all or some parts of the network. Thus, the victim's information is held at a ransom. After encrypting the files, the attacker becomes the only one with the decrypting key. In a network that experienced a ransomware attack, the system owner will not be able to have access to the files, databases, or applications. The attacker then resumes operation by demanding ransom.

    Ransomware works by spreading across a network with the aim of paralyzing the network. In a ransomware attack, the attacker uses asymmetric encryption. Asymmetric encryption is a type of cryptography that uses a pair of keys to encrypt and decrypt a file. The pair of keys are a private and a public key, and the attacker uniquely generates both keys. The private key will be required to decrypt the files, and it may be nearly impossible to decrypt the files without the private key. Imagine a situation where someone creeps into your house, changes the locks on the doors, and sends you a message to pay some ransom before you get a key to unlock your home. Often, the attacker will contact the victim on how to pay a ransom to receive the private key with which to decrypt the files or seized assets.

    --- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
    Show more Show less
    19 mins
  • Gathering Penetration Testing Intelligence from Network and Application Platform Configuration
    Jun 1 2021

    Network configuration refers to the process of setting a network's controls, flow, and operation to support the network infrastructure of an organization or for an individual owner.

    Components of a computing network include Internet/network protocols, software or application, firewall, routers, and others that perform related tasks. Most network configurations are designed to meet communication objectives. For example, the router is configured with the correct IP addresses and route settings to enable network connection and communication. Software is configured to monitor network-based activities and to detect intrusions to the network.

    Network configuration can be manual or automated, but the primary importance is maintaining a network and making changes when required. Other aspects of network configuration include the ability to launch and relaunch devices, track and report data. An automated network manager can make the task of configuration management easier to perform...More

    --- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
    Show more Show less
    14 mins
  • Security Implication Of Web Frameworks
    May 18 2021

    Web application frameworks provide a structure for building and developing applications through the provision of predefined classes, modules, and functions. The predefined classes and modules help to manage system hardware, software and to manage the streamlining of the application development process. The framework in this discussion includes application frameworks such as Angular.js or Django and content management system frameworks such as WordPress.

    Most web application frameworks use the model view control design pattern abbreviated as MVC pattern to provide structure to application development. The MVC pattern helps to ensure separate concerns for data, user interface, and input control...More




    --- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
    Show more Show less
    9 mins
  • HOW TO USE COMMENTS AND METADATA INFORMATION TO GATHER INTELLIGENCE FOR PENETRATION TESTING
    May 11 2021

    The head section of web pages contains troves of information that can be used to ensure that the site is efficiently crawled or positioned for search engine optimization. There is information about the name of the author, the description of the page, and the language used on the web page.

    Some sites have information about the Twitter account, the URL address where the images are hosted, about other relevant URL addresses that are connected to the website.

    I have viewed some source files that contained information about the forms and the input section of the form. For sites that use Google Analytics, you will see information about the Google Analytics account. Other types of information you may find by investigating the source file may include the name and type of third-party framework. All these types of information that I mentioned can provide a lead for a malicious hacker. If your web page reveals some of the types of information I mentioned here, you may need to take remediated action to ensure that no vulnerable information is exposed...More

    --- Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support
    Show more Show less
    12 mins