Posts

Week 3 - Cloud Vulnerability Scans

Image
In week 3, we continued to learn more about vulnerability scans, but this time, we continued learning by understanding cloud vulnerability. In recent years, we have relied on cloud services to help store our resources and data to continue to do the work required on different devices. With this resource and data being moved to a cloud service, some vulnerabilities could be hidden in the cloud provider. When doing a vulnerability scan on a cloud service, the scan will search for any security risk hidden in the cloud service. These security risks could be unauthorized access to the cloud, poor passwords, and further authentication that the provider hasn't set up. Our data needs to be safe on and off the cloud, so vulnerability scans are necessary when storing our essential data in the cloud. Ensuring there aren't any security risks in the cloud can ensure the data is locked and safe from cybercriminals.

Week 2 - Vulnerability Scan

Image
In Week 2, we got to learn more about vulnerability scans. A vulnerability scan is a tool that can scan a system, network, or application. With this, the tool can identify weaknesses that could lead to potential cyberattacks. These vulnerabilities can be anything big or small. Whatever crack there is to the system, network, or application is an opening for cybercriminals to send malicious codes to the system, network, or application. That’s why it’s the vulnerability scan job to scan the entirety of the system, network, and application to find the vulnerability and give IT techs or others a chance to patch it up as soon as possible. An example of vulnerability scans is during a network scan; the tool finds a vulnerability and posts the results afterward. When the IT techs review the results, the scan will inform them that the network is open and not password protected. This allows the IT techs to create a password for the network and patch up this vulnerability to prevent unauthorized ...

Week 1 - Introduction

Image
Hello! My name is Kyle Ross. Welcome to my newest blog. I'm majoring in information technology and getting closer to getting my degree. I'm currently in a course where we'll be learning about hardening computer systems and learning network risk management. System hardening and network risk management are setting up our systems to have complete security and protect us from cyberattacks and malicious codes created by cybercriminals to steal sensitive data from users. Cyberattacks are a serious cause, so taking the role of cybersecurity can help us stop these attacks and defend our information as much as possible. Each week, I'll write about what I have learned in the course and how they help protect us from these attacks. I have a history of using many different software and applications to protect myself, my family, and my friends from these attacks. Cybercriminals stop at nothing to get the information we need, which can be our social security number, financial informat...