Hey Floreth, I'm glad you are already blogging here from before.
Can you put a "Label" on posts that are for our course? Choose anything but I suggest TC1014 as your label for this course.
Then use tags for signaling which assignment this is for. So for this post I am commenting on, can you edit this and change it to: Label: TC1014 Tag: Mastery03
SCM Software Configuration Management What? SCM is a software engineering discipline consisting of standard processes and techniques often used by organizations to manage the changes introduced to its software products. SCM helps to eliminate the confusion often caused by miscommunication among team members. The SCM system controls the basic components such as software objects, program code, test data, test output, design documents, and user manuals. Who? The Software Engineering Institute (SEI) advocated a standard definition for CM oriented to software, broadening the definition of the Institute of Electrical and Electronics Engineers (IEEE) and the guidelines of the International Organization for Standardization (ISO). Why? Is software engineering practices associated with software configuration management offer a number of opportunities to address requirements found International Standard, ISO 9001. From management perspective, the principles and practices ...
" Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks impact system availability by flooding the target system with traffic or requests or by exploiting a system or software flaw" (PCcare, 2018). What happens during a DoS attack , is that a single attacker directs an attack against a single target, sending packets directly to the target. It basically targets the network bandwidth or connectivity. There are many common forms of DoS attacks , for example: Smurf Fraggle Ping flood Ping-of-death Syn Flood Land Teardrop DNS poisoning Banana Attack Negative Acknowledgement (NACK) Deuthentication (Deauth) One of the most knowledgeable and used is Spam . It consists of sending unwanted e-mail messages to users. It's considered a from of DoS because: It consumes bandwidth that is used by legitimate traffic. It can fill a mailbox or hard disk and result in legitimate e-mail being rejected. Spam is often distributed by hijacking misconfigured...
The fact is there's no such thing as a perfectly, 100& secure computer system. There will always be bugs and security experts know that. So that were System Architects employ a strategy called defense in depth, which uses many layers of varying security mechanisms to frustrate attackers. A common reference to this is looking back at medieval times where you have a to keep safe the King of a land and it's castle. Attackers or enemies need to beat or dodge various obstacles in order to gain access to the castle and conquer it, but int this context we're talking about the most common forms of computer security called Cryptography. Whats is Cryptography? The word comes from the roots 'crypto' + 'graphy' which roughly translates to = Secret Writing. In order to make information secret you use Cipher, an algorithm that converts plain text into CipherText. Whats is Encryption? T...
Hey Floreth, I'm glad you are already blogging here from before.
ResponderBorrarCan you put a "Label" on posts that are for our course? Choose anything but I suggest TC1014 as your label for this course.
Then use tags for signaling which assignment this is for.
So for this post I am commenting on, can you edit this and change it to:
Label: TC1014
Tag: Mastery03
Thanks!