Skip to main content

HomeEvents9:00 AM Cyber Security

Events - Event View

This is the "Event Detail" view, showing all available information for this event. If the event has passed, click the "Event Report" button to read a report and view photos that were uploaded.

9:00 AM Cyber Security

When:
Friday, April 5, 2019, 9:00 AM until 10:30 AM
Where:
Silicon Room (Computer Club Classroom)
SaddleBrooke, AZ  

Contact(s):
Ken Knapp
858.231.3799 (p)
Category:
PC ONLY
Registration is required
Capacity:
12
Available Slots:
6
No Fee

SADDLEBROOKE COMPUTER CLUB

CYBER SECURITY CLASS

April, 2019

                                                                                                                                                 Instructor               Ken Knapp CISSP

 

Cyber Security and Technology Class 2 Topics                                                                                     April 5, 2019

 

Software Security

 

1. Operating System Security

                A. Default – the way it comes out-of-the-box

                B. Configure – your responsibility, make changes for your environment/the way you use the system

 

2. What’s the difference between Access and Authorization?

                A. Access – you’re allowed to logon to a system

                B. Authorization – you’re allowed to perform a specific task(s), use a specific application

 

3. Application Security – 2 ways it is implemented

                A. Security is written/coded in to the application

                B. The application uses the operating system security

 

4. What’s the difference between an Upgrade, an Update and a Patch?

                A. Upgrade – a new version of an application or operating system

               B. Update – a new feature or enhancement to a feature (build)

                C. Patch – a feature didn’t work correctly or a patch to fix a vulnerability; security patch.

 

5. What’s a Log?

                A. What gets logged?                     Activities

                B. Why do I need a log?                 Tracking activity, troubleshooting, forensics

                C. What are they used for?          Verification, confirmation

                D. Can I delete them?                    Depends