Posts

Embedded Hardware Authentication

Image
As per IFF (Incognito Forensic Foundation), there are top 5 latest cybersecurity technologies or trends out there, that I think would make great sense if I go with one of those for this blog, so I decided to go with Embedded Hardware Authentication (A. 2019, November 8). What is Embedded Hardware Authentication? As the term states, it’s a hardware-based authentication that’s embedded into the hardware itself to add an extra layer of security. Normally, users log in to a machine using their PIN and/or Password, which can easily be compromised, but in embedded authentication, it verifies the user’s identity before it’ll let them access the device. Most of us are aware of two-factor authentication but in this latest trend, an organization can implement two, three, or even four different methods of authentication in a row to enhance security. Under Embedded Hardware Authentication, things are slightly different than we’re used to.   For example, users don’t necessarily receive a PIN ...

Artificial Intelligence

Image
As per IFF (Incognito Forensic Foundation), there are top 5 latest cybersecurity technologies or trends out there, that I think would make great sense if I go with one of those for this blog, so I decided to go with Artificial Intelligence or AI (A. 2019, November 8). One of the reasons I decided to go with this trend was because of some of the videos that I saw on YouTube a while ago along with a documentary that was all about AI. Before we begin, I would like to request if we can watch this quick 2-minute video using the below link before we move forward: Robot is Being Trained For War & Robot is Fighting Back// Risks of AI https://www.youtube.com/watch?v=ka0fIAPVjaU So what is AI? AI or Artificial Intelligence is a smart machine or robot that’s capable of performing tasks that typically require human intelligence. Many of these artificial intelligence systems are powered by machine learning, some of them are powered by deep learning. As we saw in the above video, shootin...

Blockchain Technology

Image
Let’s begin with a little brief history of Blockchain to understand this topic better. Blockchain may sound new to many as most of us may not have heard about it before but it’s not something new. Blockchain or chain of blocks that are cryptographically secured was first described by Stuart Haber and W Scott Stornetta back in 1991. Then Nick Szabo who was a computer scientist, decentralized digital currency back in 1998. In 2000, Stefan Konst published his theory on cryptographically secured chains including his ideas for implementation where most of the work began. Then in 2008, the model for a blockchain was established by some developers, and then in 2009, Dorian Nakamoto (Satoshi), a Japanese-American citizen implements the first blockchain as the public ledger for transactions made using bitcoin, see Mr. Nakamoto picture below (History of blockchain. n.d.): Blockchain sounds like a complicated topic but in reality, it’s quite simple especially for IT professionals because we work ...

Service Level Agreement in Cloud

Image
  Let’s begin this post with a brief introduction to cloud computing before we discuss SLA, as cloud computing is still a new technology to many organizations out there. So when was this implemented? Per the referenced article, the notion of network-based computing dates to the 1960s, but many believe the first use of “cloud computing” in its modern context occurred on August 9, 2006, when then Google CEO Eric Schmidt introduced the term to an industry conference (Regalado, A. 2020, February 11). Cloud computing application allows people to access the same type of applications thru the internet like running on a physical computer or server. There are many benefits of using applications in the cloud vs using in local machine or server. Here are few examples; Improved Security Measures Enhanced Speed and Reliability Storage Capabilities and Ease to Scale Highly Customizable Now let’s discuss SLA in cloud computing. Service Level Agreement or SLA is basically a contract betw...

Risk Management Framework (RMF)

Image
Abstract The Risk Management Framework provides a process that integrates security, privacy, and cyber supply chain risk management activities into the system development life cycle. The risk-based approach to control selection and specification considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders, policies, standards, or regulations (NIST Risk Management Framework | CSRC. 2016, November 30). With several risk management frameworks to select from, it may be difficult or complicated for an organization to pick the one that is right for them to use and alter to fit their needs.  Risk management frameworks that will be discussed in this blogs are, “Operationally Critical Threat Asset and Vulnerability Evaluation” (OCTAVE), “Factor Analysis of Information Risk” (FAIR), “Facilitated Risk Analysis Process” (FRAP), and the “Risk Management Framework” (RMF). Introduction of Risk Management Frameworks OCTAVE Allegro Operationally ...