Skip to main content
Banner_3-2000px.jpg
HomeEvents9:00 AM Cyber Security

Events - Event View

This is the "Event Detail" view, showing all available information for this event. If the event has passed, click the "Event Report" icon to read a report and view photos that were uploaded.
9:00 AM Cyber Security

Date and Time

Friday, April 5, 2019, 9:00 AM until 10:30 AM

Location

Silicon Room (Computer Club Classroom)
SaddleBrooke, AZ  
USA

Event Contact(s)

Ken Knapp
858.231.3799 (p)

Category

PC ONLY

Registration Info

Registration has closed - Event is past

About this event

SADDLEBROOKE COMPUTER CLUB

CYBER SECURITY CLASS

April, 2019

                                                                                                                                                 Instructor               Ken Knapp CISSP

 

Cyber Security and Technology Class 2 Topics                                                                                     April 5, 2019

 

Software Security

 

1. Operating System Security

                A. Default – the way it comes out-of-the-box

                B. Configure – your responsibility, make changes for your environment/the way you use the system

 

2. What’s the difference between Access and Authorization?

                A. Access – you’re allowed to logon to a system

                B. Authorization – you’re allowed to perform a specific task(s), use a specific application

 

3. Application Security – 2 ways it is implemented

                A. Security is written/coded in to the application

                B. The application uses the operating system security

 

4. What’s the difference between an Upgrade, an Update and a Patch?

                A. Upgrade – a new version of an application or operating system

               B. Update – a new feature or enhancement to a feature (build)

                C. Patch – a feature didn’t work correctly or a patch to fix a vulnerability; security patch.

 

5. What’s a Log?

                A. What gets logged?                     Activities

                B. Why do I need a log?                 Tracking activity, troubleshooting, forensics

                C. What are they used for?          Verification, confirmation

                D. Can I delete them?                    Depends

 

Join Us Today and Sharpen Your Tech Skills!