Saturday, August 26, 2017

Security!!! (Weeks 10-12)

Good lord, I noticed just now that this blog post didn't successfully get submitted last night. Okay, okay, I know that it sound like a very lame excuse for a late submission but it's totally true! Canning the excuses and moving on, let's go to what I learned the past two weeks...
Physical security. Yep. That's one out of the two things that we focused on. Physical security is exactly what it sounds like: security through physical means, as opposed to using "abstract" defenses like firewalls and such. Physical security entails a LOT of work. Using different types of extinguishers is obvious. Knowing that he number of entrances should be limited is totally logical. Physical security almost sounds easy. Suddenly, the little, yet significantly many things called Minute Details swarm at you and bit your butt. Different door types? Bollards? Natural pathways to direct you to common - or in some cases, private - areas. Did you even know that they have different kinds of sprinklers (see wet and dry pipes)? Apparently, security goes beyond crime prevention and extends until damage control. I actually asked my father (who I call Tay) for tips. He said that it is indeed a very serious affair. Fire exit corridors have to be made out of non-flammable material, including the paint. Everything has to be earthquake-proof. He even mentioned this one time when they got tasked to create a paint factory; electrical conduits have to be triple-gasket-sealed cause the high-voltage wires could ignite the chemical-riddled air at some areas. Everything's really serious here. And we aren't even dealing with software here.
The second lesson was all about security through network structure. Now, this was something that really interested me. For example, did you know that a network generally has three zones in an enterprise environment. We have the untrusted zone (basically the internet, world wide web for us normies). We have the demilitarized zone or DMZ, which contains the servers. It separates the servers from the rest of the LAN segments. DMZ was derived from the Korean Military Zone (that's a fun fact). There are various ways to create DMZs, the most secure being containing it within two firewalls (outgoing and incoming). We also have intrusion detection systems like Snort and many other threat-deterring snares.
That's about it for this week. Again, I'm sorry for the post being late. As a side note, I feel very motivated to pass our final exam. No, it's not about the meal from Shakey's promised to us. I really, really, want to pass the test, for a reason that I have yet to ascertain. Rest assured, I will learn a lot from my study reviews, regardless of whether I pass the test.
This is my second to the last blog post dear reader(s). Thanks for riding along this brain train. Have a nice- (life, day, afterlife, existence, etc).

Saturday, August 12, 2017

Crpyotgraphy n Stuff (Weeks 9-10)

What's up whats up?! It's another one of my learning logs and I am sorry that it is late once again. Anyways, I'm supposed to talk about the past two weeks again, aren't I? Hmmm let's see. The thing is, we've only had one actual day where we discussed something about the lecture, and the rest is all about the debates and the presentation of the machine projects.
I suppose I should talk about cryptography first. Cryptography, in its most elementary definition, is the altering of something in such a way that only a certain destination can decipher, which means that the encrypting process was already agreed upon beforehand. One of the earliest forms of cryptography is the Caesar's cipher, where each letter is altered to another letter, either forwards or backwards, according to a certain count. However, this is still rather weak, as one of the criteria for a strong encryption algorithm is that it should eliminate all patterns. Anyone who knows how to do a Caesar cipher can easily crack a message of that nature even if they do not know the letter skip. They merely have to adopt a trial-and-error method.
Encryption algorithms must always be tried and tested. And what better way to do that than to release it top people who would willingly try and crack it for free? This is Kerkchoff's Principle, where it is stated that algorithms must be publicly known to ensure its strength. Also, there will never be an unbreakable algorithm, as Moore's law states that technology is advancing at a very fast pace measured through the number of transistors per square inch of every integrated circuit. Moore saw that this number is actually doubling at a time period of one year, though it has currently slowed down with the change being exhibited only once every 18 months.
There's actually a lot more to the lecture but it gets to the actual algorithms themselves. Asymmetric, symmetric, and a lot of other things. However, I don't really want this blog post to be a another version of the lecture. So if you're interested more about cryptography, read up! It's actually quite interesting.