Skip to main content

Posts

Showing posts from April, 2023

ESSAY (CONCLUSION & REFERENCE)

Hi, in this blog post, I would be showing you my group's essay conclusion and the references used in our essay. We were told to use references dated within the last five years which we obeyed. We were also told to use a minimum of 5 reliable sources which we also abided by. 

ESSAY (MAIN BODY)

Hi, in this blog I would be showing you my essay's main body. The body talks more about AI in endpoint security and its functionalities/application in endpoint security. It also touches on the benefits of AI in endpoint security. 

ESSAY (INTRODUCTION)

Hi, I would be writing about the progress of my theme topic endpoint security. I am done with my introduction which made use of two references. The first image was the progress of my introduction before it was reviewed by the teacher and the second image is the result after the corrections were implemented. Image 1(Before correction) Image 2(After correction)

COMPUTER ETHICS

Source: https://th.bing.com/th/id/OIP.WdgX9ykVNsuq9J1TFGQHuQAAAA?pid=ImgDet&rs=1 The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute.  1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files.  2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical. 3) Thou shalt not snoop around in other people's files: Reading other people’s e-mail messages is as bad as opening and reading their letters:

GANTT CHART

  This is my updated Gantt chart. After completing the tasks that were assigned, I went to update my chart. This chart was really helpful in keeping track of my projects. I have designed it using 'officetimeline.com'.

MAJOR PROJECT PLAN

I used the plan below to document the process of writing about my major project. The plan shows the date when I started each task, the time I spent on them and the date I completed the task.

MAJOR PROJECT THEME - ETHICAL HACKING

Source: https://www.softwaretestinghelp.com/wp-content/qa/uploads/2020/06/Ethical-Hacking.png Ethical hacking is a practice in which cybersecurity professionals use their skills to identify vulnerabilities in computer systems and networks. This approach helps organizations proactively detect and fix potential security issues before malicious hackers exploit them. Ethical hacking is a vital tool in today's world where cyber threats constantly evolve and become more sophisticated. The concept of ethical hacking is based on the idea that the best defence against cyber attacks is a good offence. Organizations can identify and fix vulnerabilities before malicious actors can exploit them by conducting controlled and authorised attacks on their own systems. Ethical hacking also helps to improve the overall security posture of an organization, making it more resilient against future cyber attacks. However, ethical hacking is not a license to conduct attacks indiscriminately. Ethical hacker

INITIAL IDEA 2 - PENETRATION TESTING

Source: https://s32522.pcdn.co/wp-content/uploads/2020/01/it-professional-penetration-test-finding-vulnerabilites-in-client-software.jpg What is Penetration Testing? According to Cisco, penetration testing, also called pen testing, is a cyberattack simulation launched on your computer system. The simulation helps discover points of exploitation and test IT breach security. By doing consistent pen testing, businesses can obtain expert, unbiased third-party feedback on their security processes. Though potentially time-consuming and costly, pen testing can help prevent extremely expensive and damaging breaches. Why is Penetration Testing Important? Penetration testing is important because it helps information security analysts, network security specialists and other information technology professionals test the security of infrastructure and identify the potential for unauthorized access to the company's systems. This allows these groups to work on a solution that may keep the company

INITIAL IDEA 1 - ENDPOINT SECURITY

Source: https://www.42gears.com/wp-content/uploads/2021/04/featured.jpg What is Endpoint Security? My initial idea pertains to endpoint security, which is an essential module in my cybersecurity path. Endpoint security is a cybersecurity approach used to defend endpoints such as desktops, laptops, and mobile devices from malicious activities (Crowdstrike, n.d.). According to Crowdstrike, a top endpoint security company, protecting endpoints is crucial in cybersecurity, from small businesses to large corporations. Why Secure Your Endpoints? The Ponemon Institute conducted a study that found 68% of organizations have experienced one or more endpoint attacks that successfully compromised data and/or their IT infrastructure (Expert Insights, 2021). Endpoints provide a large attack surface, and implementing endpoint security solutions can help reduce those attack surfaces. While it's impossible to completely eliminate cyberattacks, reducing the possibilities or chances of an attack occu

SOFTWARE/HARDWARE SKILLS

  Source: https://th.bing.com/th/id/R.fb97e047a365e1b5b5e67239714e5d18?rik=pcqpDcFeKqE%2bLw&pid=ImgRaw&r=0 Hello, in this post I will be sharing my current IT skills and experiences. My interest in computing started at an early age and I was fortunate to have a laptop at home when I was just six years old. I quickly became familiar with Microsoft Word and Excel, and even experimented with PowerPoint, although at that time, computer-based presentations were not widely used in my country. When I was 13, I watched some tutorials on YouTube on how to hack Wi-Fi passwords and managed to obtain my school's Wi-Fi password and iPad restriction code. Unfortunately, this resulted in a controversial situation where I was recognized for my technical abilities but also punished for being unethical and causing the school financial loss. At 14, I started learning JavaScript and Python but had to focus on my high school final exams and didn't work on many projects. By the time I was 17

INTRODUCTION POST

Source: https://dm0qx8t0i9gc9.cloudfront.net/thumbnails/video/H8WuRINimqur8ud/introduction-word-intro-word-intro_bxbepgas_thumbnail-1080_01.png  Hello, in this post I will introduce my degree, Cyber Security BSc (Hons), and the university I am studying at, DMU. I chose DMU because it was the top school among five universities that offer cybersecurity at a bachelor’s level. I also liked the diversity of DMU, which has a high percentage of international students. DMU has been great so far. The computing tutors are helpful and understanding to everyone. My degree consists of three years of study, with four modules each year. The first-year modules are Foundation of Computing and Cyber Security, Endpoint Security, Secure Coding, and Business Infrastructure and Security. The second-year modules are Secure Scripting and Business Applications, Incident Response and Cyber Threat Intelligence, Penetration Testing, and Industrial Cryptography. The third-year modules are Malware and Attacker Tech

WELCOME POST

Source: https://static.vecteezy.com/system/resources/previews/000/371/208/original/vector-welcome-hand-drawn-text.jpg Welcome to my blog! My name is Perfect Bamidele and I am from one of the central parts of Nigeria, Kwara State. In this blog, I will share my insights and discoveries on various computing topics. Let me tell you a bit about myself. Some of my hobbies are playing football, reading, playing chess and listening to Afrobeat music. I have always been passionate about computing because I enjoy creating things in the tech space like websites, apps and scripts. I am also curious about how technology works and how I can innovate with it. I am currently studying at DMUIC and I have had a good experience so far. I have made friends with people from different cultures and backgrounds. The tutors have also been supportive and helpful to me. I have learned a lot of things during my time here.