Skip to main content

Posts

Showing posts from June, 2017

Learning Log 2

A part of our lesson in cryptography is the password policy and it gave me a different perspective on how account passwords are being secured. As what I've learned, passwords are the weakest type of authentication but it is the most commonly used. From my observations, companies handle the passwords differently. Some may be stricter than the other. I have an account from a website and when every time I try to reset my password, it asks for a unique one than the recent ones I've used. This proves that they handle the user's password history strictly. That kind of security may be annoying but they I guess they just want to avoid hackers. The recommended password to have is the one that's long, having caps and not, special characters, and numbers. The more complex your password is, the more hard it is to get hacked. I plan to change my usual password to a more complicated one asap. 

Learning Log 1

We were given a group activity that tested our knowledge in security. The one that was given to us was a grocery store with only two guards as their security, no CCTV or whatsoever, and they rely with the "honesty system" which lead them to lose merchandise that cost 10K pesos a month. That loss has been happening for 6 months. My group and I thought about solutions that cost zero cash so every recommendations are more on adjusting how the employees should work. I thought about the whistleblowing system where person raises concern about a wrong doing when he/she sees one. During our presentation, our professor said it was creative of us to put it as our solution, the whistleblowing system. He even said that companies would be happy to us since our solutions are cost-free. All in all the presentation went well. In the last lesson, I've come to realize that not all top privileged users are allowed to access all the resources. Mandatory Access Control (MAC) having labe