Published in Nerd For Tech·Apr 28RMF — The Five Stages of Activity | Building Secure SoftwareThe purpose of an RMF like this is to allow a consistent and repeatable expertise-driven approach to risk management. The basic idea is simple: identity, rank, track, and understands software security risk as it changes over time.Business3 min read
Published in Nerd For Tech·Apr 9SHA-2 and Bcrypt Encryption Algorithms| Comparative Analysis for password encryption Background Information: The X Company is evaluating their cryptographic usage for protecting passwords. The company previously used SHA-1 prior evidence being published of the it’s vulnerabilities. The X Company changed their encryption methods to Bcrypt until further research was conducted. …Security6 min read
Published in Nerd For Tech·Mar 30What is the Cyber Kill Chain (CKC)?Defenders mitigate not just vulnerability, but the threat component or risk, too. ¹ As you may have noticed, cyber threats have continued to rise and are projected to continue to increase going into the future. Protecting critical assets is vital in all industries, and implementing a cyber security framework provides…Technology5 min read
Mar 26The Five Dysfunctions of a Team: A Leadership Fable“If you could get all the people in an organization rowing in the same direction, you could dominate any industry, in any market, against any competition, at any time.” pg. vii Normally I focus on tech related topics, but every once and I while I come across a topic or…Business4 min read
Published in Nerd For Tech·Feb 7What Is CIA Triad? — The Backbone Of Information SecurityIn today’s world, gathering, organizing, and analyizing data has enabled new technologies and has created a vast amount of wealth. The world’s most valuable resource is no longer oil, but data. The ability to understand and create platforms around data has allowed empires to be built and lives to be…Information Technology4 min read
Published in Nerd For Tech·Jan 21Guide To Become An Ethical HackerThe Pentester Blueprint is a great resource if you are wanting to break into the offensive/defense security industry. I found this book to be a great resource for an all-in-one place to find information about Red Teaming, what it means to be an ethical hacker, and how to gain the…Information Technology7 min read
Published in Nerd For Tech·Jan 16Quick Tips for Passing the CompTIA Security Plus SY0-601 ExamI am currently a graduate student at Carnegie Mellon University (CMU) and studying Information Security and Policy Management with an emphasis in cyber security. I have a background in the topics covered in the CompTIA SY0–601 Security Plus exam. Before you read more, I want you to understand that you…Security8 min read
Published in Nerd For Tech·Dec 5, 2021IoT Vulnerabilities: IP Cameras Most Insecure IoT deviceThrough technology, the world is more connected than ever before for better and for worse. In her article, “What are IoT Devices”, Nikita Duggal states, “IoT is an umbrella term that refers to the billions of physical objects or “things” connected to the Internet, all collecting and exchanging data with…Io T12 min read
Published in Nerd For Tech·Nov 16, 2021What Is Zero Trust Architecture?The world is evermore connected through a variety of technologies that encompass the internet. Organizations’ networks are growing, as well as the number of devices connected to their networks. Organizations are dependent upon these networks and their capabilities to be connected and share data. This short executive summary will define…Information Technology3 min read
Published in Nerd For Tech·Nov 2, 2021What is Quantum Computing?The implications of the continuous growth in quantum computing will greatly affect the future of security. As quantum computing begins to be introduced, it is crucial that other technologies emerge to ensure security in the future. Throughout this report, I will describe the basics of quantum computing and possible effects…Quantum Computing3 min read