Where to find me.

I used this blog for a school project back in 2013. As of December 2014, l have graduated from college.

And work full time as an IT Business Analyst, host the First Year Marriage Show Podcast on iTunes, and co-authored Communication in Marriage: How to Communicate with Your Spouse Without Fighting

You can find me at the following places:

Our Peaceful Family 

On this website, I help newlyweds adjust to their first year of marriage and inspire married couples to improve their marriage.

Soccer Pursuits

On this website, I help soccer parents to become the best cheerleaders for their kids.

Thank you for following me and reading my articles.

Advertisements

Perimeter Security

Perimeter Security (PS) is basically the securing of a network to withstand an attack especially threats from outside the network. Due to the nature of threats from both outside and inside a network, PS is a very challenging form of security for a network. PS is also very essential to the performance of any network and the information systems such as databases, servers, workstations,  mobile devices etc. that rely on the network.  In order for any business or organization to apply a PS, they must understand why they need a PS, the pros and cons of a PS, the threats the business or organization is likely to encounter, and how best the business or organization can use PS to enhance their networks.

Since organizations and most businesses love making profits from the goods and services they provide to their customers, they clearly understand that investing a few dollars today to secure their network perimeter will go a long way to increase their profits. Hence, businesses and organizations do their very best to protect their networks from the havoc caused by attacks and threats.

Before a business or organization decides to implement a PS for their network, they intentionally focus on their network’s needs, and the threats or attacks they might face since attacks or threats vary from business to business. Once the business has made these identifications, they spend enormous amount of time researching the best way to effectively and efficiently use a PS to secure their network while meeting the goals of the business.

Article Source

http://blog.simplilearn.com/it-security-management/network-perimeter-security-design

 

Managing Security of Mobile Devices

Mobile devices are now the being used by a most people in addition to the laptops and desktops already in use. As a result, businesses are forced to allow the use of mobile devices in the workplace, but how do these businesses manage the security of these mobile devices? Most business have to come up with their own Policies for mobile devices, mechanisms for controlling their Wireless Access Points and Network Access Controls, the usage of Policy Servers, and Mobile Device Management (MDM) systems.

The creation of policies by businesses to manage and secure mobile devices used by their employees has been the most common practice. Businesses design and implement these policies by understanding what threats are likely to attack the mobile devices on their networks. Most of these policies are enforced due to the impacts threats can have on mobile devices. Businesses also educate, train, and ensure their employees understand these policies.

Policy servers ensure that all stolen mobile devices cannot be tampered with. Hence the moment a business realizes that a mobile device containing information has been stolen or gone missing, they use their Policy Servers to erase the content of that mobile device in order to prevent unauthorized access to the information on the device.

MDM systems are implemented after a thorough analysis of the pros and cons of using such a system by the business.  Any business that decides to use an MDM system must first determine how they will use the MDM system for their applications, devices, and users. Wireless Access Points and Network Access controls enables businesses to determine which devices can access their networks, and what activities the devices can perform on the network.

Businesses that implement the some of the above methods for managing and securing mobile devices will greatly reduce the threats and attacks on their mobile devices.

Web Services Security

Web Service is the basically the exchange of data between two electronic devices using the Internet as the communication bridge.  Since the Internet itself is not secure, data that is exchanged using it automatically becomes insecure. Even though this security issue cannot be solved 100%, businesses can employ certain measures to ensure their Web Services are secure. Some of the methods that can be used to secure Web Services are authentication, the use of firewalls, encrypting the data exchanged, and implementing security policies.

Authentication is usually required to access secured information; hence whenever businesses exchange data over the internet, they rely on some form of authentication to ensure the data exchanged is between the right individuals who have authorization to the data sent.  Although firewalls are now built into computers, hence making it less expensive for businesses to protect their computers, the local area networks or wide area networks for businesses must still have firewalls installed on them to help secure their Web Services. Most businesses use firewalls, as one of their basic security measures to prevent malicious attacks on their Web Services.

Data that is exchanged between businesses over the Internet are usually encrypted due to the Internet not being secure. Some of the common methods used to encrypt the data exchanged are Private key encryption; requires only one key, and Public key encryption; requires two keys (one to encrypt and the other to decrypt). In addition, businesses create and implement Web Services security polices to serve as a guide in their Web Services activities.  A few examples of companies that use Web Services are Google, Amazon, and Ebay.

 

Article Sources

 

 http://searchsoa.techtarget.com/definition/Web-services

 

 http://msdn.microsoft.com/en-us/magazine/cc164158.aspx

 

 http://www.tldp.org/REF/INTRO/SecuringData-INTRO/encryption.html

Email Management and Security

One of the many tools of communication that the internet has blessed us with is an email messaging system. By using emails as a reliable form of communication between a sender and the receiver of the email, two individuals, organizations or businesses are able to transmit information easily and faster. Even though email usage has a lot of pros, it also presents us with some cons which if not handled properly can result in the loss of important information, which could lead to potential lawsuits, loss of human resources and money.

Effective and efficient management of emails definitely improves the information systems for businesses and organizations. Emails sent and/or received within or outside a business or organization must comply with all policies regarding the use of emails as a means of communication in any business or organization. It must also be managed extremely well on a daily basis to prevent malicious attacks, phishing, and spams.  As a result, some medium-sized and large businesses employ an email manager/administrator to manage their email messaging system.

Some methods that companies and organizations can use to prevent malicious attacks on their email messaging system could be installing anti-virus software on their computers, anti-spam filters, and using email filtering systems. In addition, businesses and organizations must educate, and train their employees about the benefits of a secure email messaging system. They must also decide which email clients can be used to serve their needs both in the short and long term. Therefore every business or organization needs to secure and manage its email messaging system.

Article Sources

http://www.theemailadmin.com/2013/09/how-to-talk-to-your-users-about-email-security/

http://www.net-security.org/article.php?id=816&p=2

Database Activity Monitoring

Database Activity Monitoring (DAM) is a tool through which the activity of a Database Management System (DBMS) is monitored and stored outside of the DBMS.  DAM monitors, blocks, and alerts the database manager of any changes especially unauthorized access or cyber-attacks to a DBMS. In addition, DAM enables businesses and organizations to comply with Compliance and Security laws related to databases since non-compliance to these laws is illegal.  

Databases are well known to be used for storing large amounts of data, which is then managed, retrieved, and used in making good decisions. Hence any loss of data for an organization or business will lead to security breaches and most likely financial loss. As a result, businesses and organizations do not only need to secure their databases but must also monitor it in real time using DAM tools. The usage of DAM tools will greatly reduce the rate at which DBMS will be breached on a daily basis since most unauthorized access or cyber-attacks will be detected by the DAM in real time, thereby enabling the database manager to take necessary actions needed prevent any harm to the DBMS.

Every business or organization that decides to use a DAM tool must invest some time and effort in researching which tool they need. They must also ensure that their policies will comply with the use of such DAM tools. If their policies do not comply, the business or organization must revise their policies in order to ensure the DAM tool is used effectively and efficiently. Businesses/ organizations must also educate their employees about the importance of such tools.

Article Source

http://ezinearticles.com/?Choosing-Between-Database-Activity-Monitoring-Solutions&id=5509779

Effective File Server Security

The safe securing of files on servers is not an easy task to undertake by any organization or business. It requires being in compliance with security policies and laws that govern file server security. A business or an organization must therefore understand which file server threats they are likely to have, how these threats can be prevented or how its risk can be minimized. In addition, companies or organizations will need to understand the best methods the can use to implement file server security.

Although they are numerous ways, for example, the usage of file permissions that determines what an authorized user can do with a file, an organization or business can use add an extra layer of protection to their file security by using a proxy server.  Since a proxy server can provide both security and anonymity, it can definitely improve file server security. The proxy server must therefore be obtained from a very reputable company that is also trustworthy. Proxy servers usually slow down internet connection, hence businesses and organizations will need to evaluate both the pros and cons of its usage before trying to use it.

Continually educating employees about file server security will also go a long way to prevent unauthorized access to files since employees will be aware of the threats to file servers, and be individually responsible for protecting the file servers. Physically securing access to file servers and software clients that are used to manage them, data encryption, and the setting of permissions for various levels of access or usage to a file server are also very effective ways for securing file servers. Hence, any organization or business can apply some of these methods to help secure their file servers.

Article Sources

http://www.entrepreneur.com/article/225468

http://www.techrepublic.com/blog/it-security/the-basics-of-using-a-proxy-server-for-privacy-and-security/