Skip to main content

Posts

Showing posts from April, 2022

Computer Ethics

  2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical.                                ( Rohan  ,2020) Computer viruses, worms, and Trojan horse programmes cost individuals, businesses, and government organisations millions of dollars every year. Traditional solutions have included the employment of antiviral software to eliminate viruses or limit the transmission of contaminated messages and firewalls. The necessity to respond promptly to new or potential assaults has raised the appeal of subscription services that provide customers with the most up-to-date antiviral protection. On the other hand, unprotected systems can get infe...

Initial Project Plan

 

Task 3 - Work on Software/Hardware Skills

 I will share some of my software/hardware knowledge in this post. As I mentioned in task 2, I was a sysadmin in Brazil. Therefore, I had to fix computers and servers(software and hardware). In another way, I learned to hug different things  in my first term, like:  Create a website with WIX. Sketching the website with Draw.io. Using excel to work with a database of my website. Windows Server 2012. Linux (Evernex, 2022) In this term, we will work with Python as a programming language. I am so excited to start work with python because it is mostly used for cybersecurity to build their exploits. (Woodie, 2020) Finally, all those tools will be handy to help in my care, and I hope to learn more each day because knowledge is never too much.  References: Evernex, 2022. [image] Available at: <https://www.evernex.com/what-you-really-need-to-know-for-choosing-your-server/> [Accessed 14 April 2022]. Woodie, A., 2020. [image] Available at: <https://www.datanami.com/2...

Task 2 - Introduction Post

 When I decided to join a university, I looked for good universities to apply to, and I found DMU. It is one of the 100 best universities in cybersecurity. That is why I am choosing DMU. In the DMUIC, I have got some skills useful for my DMU and work journey, like how to write an academic essay and also how to do research, plan and build my own e-commerce. (DMU, 2022) Some mandatory modules of my curse cybersecurity: Secure Scripting and Business Applications  Incident Response and Cyber Threat Intelligence  Penetration Testing  Industrial Cryptography  Malware and Attacker Techniques  Cyber-Physical Systems Security Also, we have some optional modules: Cyber Security and Social Responsibility Artificial Intelligence for Cyber Security  Digital Forensics and Cyber Crime Investigation The optional module I would like to do is Artificial Intelligence for Cyber Security. Plan and Goals  My plan and goals are to try joining in cybersecurity area as so...

Major Project Topic: Malware

  What is Malware? Malware, short for "malicious software," refers to any invasive programme produced by cybercriminals, called "hackers" to steal data and damage or destroy computers and computer systems. Malware types include viruses, worms, Trojan viruses, spyware, adware, and ransomware. Recent malware assaults have resulted in massive data exfiltration(Cisco, 2022) (Norton, 2021) Types of malware Malware is classified into several categories, including viruses, worms, trojans, ransomware, bots or botnets, adware, spyware, rootkits, file-less malware, and malvertising. While the eventual aim of a malware assault is frequently the same to get access to personal information or harm the device, generally for financial gain, the means of distribution might vary. Some may even employ a hybrid of these virus kinds (Norton, 2021).   Viruses are a sort of malware that takes the shape of a piece of code that is put into an application, programme, or system and is distri...

Initial idea 2: Industrial Cryptography

   Cryptography: The study of secure communications systems that enable only the sender and intended recipient of a message to read its contents is known as cryptography. The word comes from the Greek, word kryptos, which means "hidden." It is closely related to encryption, which is the act of scrambling plain text into ciphertext and then back again when it arrives. Furthermore, cryptography includes the obscuring of information in pictures through the use of methods such as microdots or merging. The ancient Egyptians were known to apply similar tactics in complicated hieroglyphics, while Roman Emperor Julius Caesar is credited with inventing one of the earliest modern cyphers(Kaspersky, 2022). (Enisa, 2016) Techniques of cryptography Cryptography is inextricably linked to the fields of cryptology and cryptanalysis. It covers techniques such as microdots, combining words and pictures, and other methods for concealing data in storage or transport. However, in today's comp...

Initial idea 1: Artificial Intelligence for Cyber Security

Artificial Intelligence for Cyber Security The cybersecurity sector is now centred on artificial intelligence (AI). AI is a buzzword these days, but it refers to a few strategies that may be pretty useful for security. It is made of machine learning algorithms that can detect and respond to threats in real-time. They can determine if incoming data is harmful or not. Many of the assaults that occur nowadays are not new. In truth, similar attacks have happened to other persons in different locations. As a result, if we create a database that stores all of the data that has ever been collected and feeds it to machine algorithms, assaults can be stopped before they happen(Kashyap,2019). (CHACHAK, 2022) Applications of AI Techniques:  As we all know, we are heading toward a future where we will interact with more intelligent machines than humans. As technology advances, so do dangers and attacks. We must include AI approaches in our security system to combat these threats. In this part,...

Welcome

 My name is Alexandre. I am from Brazil, São Paulo; I am passionate about computers and cars. I am in love with cybersecurity and programming. Since I was ten years old, the computer has been part of my life. My favourite hobby is watching Formula One and playing games on the computer. (Ijdema, 2022) As a computer enthusiast, And worked as SYSAdmin a long time ago in Brazil, I decided to come back to IT but change to cybersecurity. When  I searched for a university, I found DMU with good scores. Furthermore, after completing my first term and being familiarized with my subjects,   I  realized how exceptional experience I had at DMUIC. I am soo thankful to had this experience. References Ijdema, 2022. [image] Available at: <https://www.dreamstime.com/royalty-free-stock-photos-welcome-word-cloud-written-many-different-languages-chalkboard-image40744408> [Accessed 28 April 2022].