#TC2027 #TBT

The semester has come to an end, and with it, it comes to answer the ecoas and make public reviews about your classes during the semester…ok, I am just making a review about one class: «Seguridad Informática» aka #TC2027. This class was imparted by Ken Bauer and this is class is the reason way I made this blog. For me this class had its pros and cons, like many other classes (but most of my cons I think it was me instead of the class, but I am going to talk about that in a little bit).

giphy-9

So this class was a little different from other classes, because it involved a flipped learning methodology (which flipped many of my classmates and I include myself in this one) and an abolish grading policy kind of situation. So the good thing about this class was that Ken tried to take us out of our comfort zone of learning, which is both, good and bad depending of how you see it. At first, I was very disconcerted about this situation, because I am not very into writing blogs (or any kind of writing), so this was kind of a challenge for me. Then the abolish grading policy, I saw it as a good thing, because it either proves own well you know yourself or how well you trick yourself; and besides it was a new policy we never had before so there’s that.

For me the hardest part of this course was writing the blog post, because as I mentioned I am not use to write this type of things. So I was stress, because I didn’t wanted to make a blog that was very «school alike» and I wanted a blog that was more «»me»». At the end, the process of making the blogs was entertaining, but if we are being realistic, it wasn’t my thing. I know that with this, the purpose of Ken was for us to more proactive and be more self-taught people, but is hard to make blogs (and yes I know I am repeating that a lot). But again, If I am being completely honest…I kind got better during the semester at making blogs…I think.

giphy (10).gif

From this class, I like that from time to time, Ken brought some very interesting people that were working in the security field, and also some others that weren’t in the field. So that was nice. Also another aspect that I found very enriching was the appointments with Ken. At first, I was skeptical about this, because I thought that it was going to be very awkward and that the conversation was going to be very forced, but it wasn’t AT ALL. They were nice conversations were, I could learned more about Ken and also I know that he is a person that I can count on if I need any advice in the laboral aspect of my life. Also I like that Ken wanted to push us to have a digital persona out there, because let’s face it, the internet can connected us and that’s what Ken wanted. I also like making collaborative blogs, because some how it make them easier.

I know that the blogging thing wasn’t for everyone, so I can recommend maybe changing that for making less blogs and having a balance between theory and practice. I know that I didn’t realize some of the practices we had, but they were very interesting (I know I am kind of contradicting myself here, but that’s right).

In general, I can say it was a good class, not my best but never the less a good. I personally would have like having a couple of lectures from time to time, but that’s my own personal opinion. I surely recommend to have a class with Ken, because he is an excellent teacher and mentor, and because he is a teacher that is always renewing his methodologies and that’s pretty good. So to future Ken’s students I recommend you to take advantage of Ken (in the good way) and try to learn the most you can from him.

Please, not Windows again!

#CParravirgen

As part of the collective knowledge, I parter up with my friend Alex Carrillo, please give it a check at his blog too!

This time, we decided to work together on a blog about OS security. Here is what we came up with:

An OS can face many types of threats, and it needs to be able to protect itself. Here we will list some features or actions, that an OS needs to have or be done.

  • User Authentication
    • User authentication is a very important aspect to have, because with this, the OS can give access only to does people that have a user and a password. if an external person tries to access the computer by trying an invalid user and password, this will immediately reject them. Also by creating users, the OS can gave special privileges to some users. Of course, to be able to do that…

Ver la entrada original 734 palabras más

Security Countermeasures

We live in an era, where everybody has some kind of digital device. Most of us have at least 2 of this devices, if not more. We interact with them in a daily basis; in our work, in our home, at the school, at entertainment centers, etc. This gadgets are taking over the world, but most importantly our lives. And if this devices are being an essential part of our lives, well… we are very likely to have some security threats on our way. In our lives, we are always expose to some kind of threat, even if we like it or not, and if we have a digital device, we are expose to a different new kind of threat, that it didn’t exist before.

Seguir leyendo «Security Countermeasures»

Security on the web

giphy-5

OOOH the internet such a beautiful and harmonic place yet so full of stranger dangers and mischievous things. People must of the time are very naive when they are on the internet. They are not well aware of the dangers that the internet has. Even though this seems like I am giving a bad reputation to the Internet, I am only saying the truth. Yes, the internet is one of the most amazing inventions there is. It has help people from all over the world communicate in a way it seems impossible before and has brought us many other wonderful things. But sometimes there are people that take advantage of this great invention and try to use it for malicious purposes. Every time we navigate in the internet we are expose to some kind of danger, but if we are smart enough we will be able to not fall into the tramps.

Seguir leyendo «Security on the web»

The Evil Within my Computer

I remember when I was a kid entering to these websites were you can play free games. Sometimes I entered to webpages that were legit, but other times I didn’t. And I entered those unlegit websites because I didn’t knew of the harm that those websites could cause. So by now you probably figure out that my computer was FULL of malware, by that time. The concept of malware is not knew in the computer science community, but many people do not know what is malware and the various types of malware it exists in the world. In this post I will talk about some of the most common malware there are and how can we prevent them.

Seguir leyendo «The Evil Within my Computer»

Don’t go breaking my rules

Imagine a world without rules, with no one telling you what to do, how to do it, why you should it and so on. You could make your own rules, like «no rules allow» or some other nonsense like that. Even though this idea seems pretty cool, it isn’t at all. A world without rules would be pure chaos and madness, with everyone doing what they want no matter what. So we can say that rules are very important no matter what people may think. Rules are the ones that makes us keep control (sometimes) of our nonsense actions. We can find rules everywhere nowadays; in the parks, schools, buses, malls, states, countries, households, internet and sooo many other places. Today I am going to focus on a very specific type of sets of rules which are security policies.

Seguir leyendo «Don’t go breaking my rules»

Can we work in pairs of three?

Many good things in life come in thirds, for example: movies, triplets, videogames sagas, three cakes, or even the three episodes per season of Sherlock. But when it comes to cyber security topics there is also good thirds, like the CIA (not to get confuse with certain agency in the USA). I am talking about Confidentiality, Integrity and Availability. These are some of the most important subjects to take in consideration when you are involve in cyber security. But you maybe asking, what are this concepts? well, basically we use this three concepts as a model that will help us identify if we have a secure system or not.

Seguir leyendo «Can we work in pairs of three?»

The «Y’s» in CyberSecurity

Our generation, the so call «millennials», we were born in a time when computer science was in a constant change. New technology was being made, new algorithms were being researched and so on. Basically, as we have been growing up, technology has also been «growing» up with us and it is still growing, just like us, but with the only difference that we have a dead line and technology doesn’t. As humans when we first use any technological device, like a computer, ipad, smartphone, etc., we are amaze by the amount of actions that device can do.

Seguir leyendo «The «Y’s» in CyberSecurity»

[First]

Hello, and welcome to my blog. In this blog, I will talk about cyber security (mainly) and other random topics of my interest, like movies, food, and maybe some politics (who knows). The main reason of making this blog, is that in the course of «Seguridad Informatica, that I am currently taking, my teacher wanted us to share our thoughts about various topics concerning cyber security. This is the first time that I make a blog and post constantly on it. I hope you enjoy it, as much that I will.

Peace out

A.C.