Posts

Showing posts from May, 2025

Module 7. Securing Mobile Devices

Image
   SECURING MOBILE DEVICES DEFINITION Mobile security refers to securing data on mobile devices such as smartphones and tablets. IMEI The International Mobile Equipment Identity (IMEI) number is used to identify a device that uses cellular networks. RISKS Mobile device security risks include eavesdropping, unmanaged applications, theft and loss, mobile devices not limiting Internet connections, and unauthorized access. MALWARE Mobile malware is malicious software that is specifically built to target mobile phones and smartphones systems. Mobile malware steals confidential data, racks up long-distance phone charges, and collects user data. VULNERABILITIES Mobile application vulnerabilities include insecure data storage, broken cryptography, insufficient transport layer protection, and poor authorization and authentication. Threats to Bluetooth devices include Bluesnarfing, man-in-the-middle attack, and backdoor hacking. SOLUTION & PREVENTION Regularly updating mobile OS fix...

Module 8. Securing The Cloud

Image
   Securing The Cloud CONCEPT Cloud computing is the use of  internet-based servers  to store data and run applications  remotely , managed by service providers. Users  rent  storage and computing resources, which can be accessed globally. This is especially useful for companies needing to process large data without investing in costly infrastructure. TYPES Private  Cloud – Dedicated to one organization; suitable for sensitive data. Public  Cloud – Shared by many users; managed by a provider. Community  Cloud – Shared by organizations with common interests. Hybrid   Cloud – Combines multiple cloud types, allowing data portability while maintaining their distinct advantages. TYPES OF CCS Infrastructure as a Service (IaaS) : Provides basic IT resources like virtual machines, networks, and storage. It forms a flexible remote IT system, used by individuals and organizations—for example, storing photos or music in the cloud. Platform as ...

Module 9. Securing Network Connection

Image
   Securing Network Connection DEFINITION A network is defined as a group of computers and other devices connected with each other to exchange data TYPES Local Area Network (LAN):  A network within a limited area (e.g., office or school) that connects computers and devices to share data and resources like printers and storage. Wide Area Network (WAN):  A large-scale network that connects multiple LANs across different geographical areas, allowing communication between distant users and systems. Virtual Private Network (VPN):  A secure, private connection between computers or networks over the internet, using tunneling to create a temporary, encrypted communication channel. Ethernet:  When users plug in a cable into their computers to connect to the Internet, this method of Internet connection. Home Networking: Process of interconnecting all devices in a home together and with the Internet in general; these devices include computers, laptops, mobile phones, ...