CSOL 500 was an exciting and fun course that introduced me to the world of cybersecurity. The course touches on many general topics from the history of technology and its insecurity in modern-day cybersecurity. Although criminal breaches into companies mainly for monetary gains, it was not always the case. Cybercriminals often stage their attacks on high-profile companies and products to maximize the return on their efforts. Not always, but the criminal's motive is mostly around monetary gains. In a recent event, the very popular Ring camera systems acquired by Amazon were compromised. The cybercriminal's actions resulted in unauthorized access to Ring's user accounts and breached people's privacy.
I spent countless fun hours researching cybersecurity tools and how criminals leverage them to breach into companies. I learned to install and became very proficient in the Kali Linux Operating Systems and tools. I am currently using many different flavors of Linux to conduct ethical hacks (of course, with permission from the companies).
There are two CSOL 500 that stuck in my mind, the reference monitor and the role-based access control (RBAC)workflow. In operating systems architecture, a reference monitor is a secure, always-used, and fully testable module that controls all software access to data objects or devices. The reference monitor verifies the nature of the request against a table of allowable access types for each process on the system (PCMag, 2021). Role Base Access Control grants and deny access based on roles and privileges.
I spent countless fun hours researching cybersecurity tools and how criminals leverage them to breach into companies. I learned to install and became very proficient in the Kali Linux Operating Systems and tools. I am currently using many different flavors of Linux to conduct ethical hacks (of course, with permission from the companies).
There are two CSOL 500 that stuck in my mind, the reference monitor and the role-based access control (RBAC)workflow. In operating systems architecture, a reference monitor is a secure, always-used, and fully testable module that controls all software access to data objects or devices. The reference monitor verifies the nature of the request against a table of allowable access types for each process on the system (PCMag, 2021). Role Base Access Control grants and deny access based on roles and privileges.
References:
PCMag. (2021). reference monitor. Retrieved from https://www.pcmag.com/: https://www.pcmag.com/encyclopedia/term/reference-monitor
PCMag. (2021). reference monitor. Retrieved from https://www.pcmag.com/: https://www.pcmag.com/encyclopedia/term/reference-monitor