Posts

device hardening

 the methods used to eradicate means of attack, this can be: Disabling unused network ports strict password management using multi-FA updating computer systems to patch out bugs removing non essential programs setting time limits staff training  rotating generated passwords Network hardening best practices Ensure your firewall is properly configured and that all rules are regularly audited and updated as needed Secure remote access points and remote users Block any unnecessary network ports Disable and remove unused or extraneous protocols and services Encrypt network traffic Server hardening best practices All servers should be established in a secure data center Harden servers before connecting them to the internet or external networks Avoid installing unnecessary software on a server Compartmentalize servers with security in mind Use the principle of least privilege when setting up superuser and administrative roles Application hardening best practices Remove unnecessary co...

The types, services, and benefits of cloud computing

 Cloud computing refers to the outsourcing of IT services and infrastructure, allowing them to be remotely accessed from anywhere, boosting efficiency. the four different categories are: Public - can be used by anyone who pays, very large services such as AWS or google cloud are included private - can be used by people within an organisation, usually password protected, used for work at home within a job community - designed for and used by a group of organisations within a particular industry to allow all businesses to provide better services Hybrid - using multiple categories each one for different things eg public, but the private for sensitive information handling Delivery models of cloud computing There are 6 delivery models IaaS (Infrastructure as a Service): Provides virtualized computing resources like servers, storage, and networking over the cloud. Example: AWS EC2, Microsoft Azure. PaaS (Platform as a Service): Offers a development environment to build, test, and deploy ...

IPA - inclusion

 Investigatory powers act 2016, (nicknamed the "snooper charter" due to the range of surveillance powers I gives the government) overseen by the Investigatory Powers Commission can be split up into 3 main parts interception of communication - This has to do with access to all digital communications, including phone calls, emails and all types of messaging while in transmission.​ Once a warrant is granted, Government intelligence and security and financial agencies such as HMRC can read emails and listen to phone calls and all other forms of communications while they are in transmission.​ Equipment interference/hacking - Security and Intelligence Agencies under this act can legally Hack into  digital devices  such as networks,  mobile devices and servers.​ This includes downloading data from a phone or installing key logging software which will enable security agencies track every key imputed by the user.​ Retention of records -  Internet communications and recor...

Resilient Digital environment

 Methods used to implement digital resilience risk analysis of digital system's resilience by testing it against penetration testers/white hat hackers planning for disruption scenarios such of data leaks or loss due to cyber criminals, or natural disasters planning disaster recovery and conducting recovery exercises in case of said data leaks documenting lessons learnt, how you can improve on your response for if it happens again, and how you can stop it from happening again installing new software updates and new hardware in replace of older versions as newer systems patch bugs that can lead to security breaches adding redundancy to systems, so if data is lost, it can be recovered as it will have a copy device hardening (removing unneeded apps, ports and permissions) to stop people being able to plug in malicious hardware such as thumb drives with malware on them maintaining effective backup systems, in the case of large scale data loss, it can all be recovered if stored elsewhere...

Cisco triumph!!!

Image
 

business context review

Image
  business context brands and brand differentiation is important to having a reputation for you/your brand as well as building brand recognition knowing your market, to allow you to make fair commission prices within the companies budget, while not undercharging how remote working and AI can affect the productivity of a business and the business as a whole change management and how changes are received, approved and carried out laws, legislations and regulations companies have to follow P for Political: Government actions and policies. E for Economic: Economic conditions and trends. S for Social: Cultural and societal norms. T for Technological: Innovations and technology trends. L for Legal: Laws and regulations. E for Environmental: Ecological and environmental factors. S for Strengths : What the organization does well. W for Weaknesses : Areas for improvement. O for Opportunities : External chances to grow or benefit. T for Threats : External risks or challenges. C for Corp...

Factors that drive change and a range of methods organisations can apply in response to change inc

there are many factors that can drive change within an organisation Internal factors External factors political Change in government with any change in government there is usually a change in policy and regulation, this can be things such as changes in local and international trade, taxes, VAT, and minimum wage levels for employees War - economic impacts Lost GDP Creates unemployment Damage to buildings and infrastructure raise in national debt meaning higher taxes inflation opportunity costs phycological costs new tech/innovation decline in working population Economic meeting new funding/revenue streams revenue streams are various sources from which a business can earn money from the sales of goods/services. the types of revenue/funding depends on the type of activities carried out, in order to improve the business's operations and profit, they should consider how the business makes money are current revenue streams appropriate how can streams be changed to increase business incom...