Wednesday, 9 December 2015

CLO5

Section 1 : 
Cyber security 
I used google chrome search engine to access a website
Cyberkov 
Section 2 :

Article 1 
Security awareness 
This article help people  to improve their privacy and security in the internet. 
Alali, A. (2015). Security Awareness. Retrieved December 9, 2015, from https://cyberkov.com/security-awareness/
Security awareness

Article 2
Security Assessment
A programmer of the company it self improve the system preformance and physical condition.

Alali, A. (2015). Security Assessment. Retrieved December 9, 2015, from https://cyberkov.com/security-assessment/
Security Assessment

Article 3 
Source code analysis
This process help to find gaps in the system it self and give you solution to close it.
Alali, A. (2015). Security Assessment. Retrieved December 9, 2015, from https://cyberkov.com/security-assessment/
Source code analysis





Section 3 :
                                                             Security Awareness
Security Awareness, it is very important for all people who uses internet even governments that use system connected to the internet. So all people must start learning about the risks and attacks in the internet and how do they happen to avoid them, so risks can happen like system down as we hear all the time also attackers like hackers want destroy the system or steal information for that system database. So all of must be updated to these changes and this awareness for every one using internet to get more detailed information of internet security.

                                                               Security Assessment 
Security Assessment is the process of employing administration tools and techniques to verify the configuration also the physical protection, while this process is for companies and organizations not for normal users. So the information technology man in the place go throw system to find mistakes and fix them by re-programing it, in addition he go and check the physical condition if its cracked or not like for atm if there was a gap the hacker just needs to plug his usb and can steal what he wants from that bank.

                                                                Source code analysis
Source code analysis, it is also a process for companies and organizations to improve their security defenses by going back to the system programs which is the language used like java or HTML to find gaps and backdoors that was made by who did the system it self for example if you started a company you will bring an IT man to design a system for this company and you don’t know if he put a backdoor or not, also check the encryption if can be bypassed easily or not to improve it.
Section 4 : 

Articles ranking 
1-Security Awareness
2-source code analysis
3-security assessment 



I think Security awareness is the best article , because the most important thing its to know what's happening around you in the internet world for your personal life, to keep your device safe from hackers or personal accounts over the social media like Facebook and twitter, or even your career life like if you are working in a bank to keep customers accounts safe from attacks and being lost or even being fraud by some fake e-mails and that will for your bank to lose both people and repetaion.And for my area all the time I hear or even I read in the newspaper that an military organization has been hacked and all officers information being published through the internet and as a result that would put their life in danger, so we should protect our self's before that happens to us which I mean is our private organazitions.Finally what I want to know is how these attacks happen exactly how do the hackers learn, also why do they attack and the governments can discover them and what procedure followed to catch them and what kind of punishment they get ?