Ferreira Logo

Ferreira's Gentle Sailing Web Site

BCC Logo Home CIS132 CIS134 CIS158 CIS271 CIT150


CIT150 - Network Security

Security Image
Welcome to Cyber Security Principles

Returned Assignments


May 16, 2019, 5:00 pm


May 16, 2019, 5:00 pm
Look Around

Everything that you need to know about this course is on this site.  This includes policies, assignments, quizzes, and much more information. Look around and get to know it well.

This course will also make use of eLearning. Please make sure you visit it regularly.



Security+ Guide to Network Security Fundamentals

Sixth Edition
by Mark Ciampa
Course Technology, Cengage Learning
ISBN 13 : 978-1-337-28878-1
ISBN-10 : 1-337-28878-0

Please note that I use Cengage texts for CIS134 and CIT150. Cengage Unlimited is a subscription option that could reduce your cost.

Facebook Stored User Passwords in Plain Text

An article titled "Facebook Stored Hundreds of Millions of User Passwords in Plain Text for Years" from Kerbs on Security begins by saying "Hundreds of millions of Facebook users had their account passwords stored in plain text and searchable by thousands of Facebook employees — in some cases going back to 2012, KrebsOnSecurity has learned. "
Click on the link above to read the entire article.

Microsoft Azure Dev Tools for Teaching

For Bristol students, on February 14, 2019 the Microsoft Imagine web store was officially renamed to Microsoft Azure Dev Tools for Teaching. Software that was previously available from Microsoft Imagine has been moved and is now available on this new web site. At this time, anyone with a bristolcc.edu email address can sign into MS Azure Dev Tools for Teaching.
An announcement has been posted on the cisweb home page about the new change. In addition, the links on the cisweb software tab have been update. Once there, click on the "Help" button for more instructions for signing into Microsoft Azure Dev Tools for Teaching and downloading software.

Essential Security Certificates

In his article, Essential certifications for smart security pros, Roger Grimes presents a list of sought after security certifications and makes a case for each.

DHS Security Alert to DNS Hijacking Attacks

In his article, The DHS issues security alert about recent DNS hijacking attacks, Catalin Cimpanu for Zero Day begins with " The US Department of Homeland Security (DHS) has published today an "emergency directive" that contains guidance in regards to a recent report detailing a wave of DNS hijacking incidents perpetrated out of Iran."
Click on the link above to read the entire article.

The Equifax Breach

In his article, The Equifax Breach: What You Should Know, Brian Krebs begins with " It remains unclear whether those responsible for stealing Social Security numbers and other data on as many as 143 million Americans from big-three credit bureau Equifax intend to sell this data to identity thieves. But if ever there was a reminder that you — the consumer — are ultimately responsible for protecting your financial future, this is it. Here’s what you need to know and what you should do in response to this unprecedented breach."
Click on the link above to read the entire article.

Supply-Chain Security Problem

In his article, Software Has a Serious Supply-Chain Security Problem, Andy Greenberg begins with "The warnings consumers hear from information security pros tend to focus on trust: Don't click web links or attachments from an untrusted sender. Only install applications from a trusted source or from a trusted app store. But lately, devious hackers have been targeting their attacks further up the software supply chain, sneaking malware into downloads from even trusted vendors, long before you ever click to install."
Click on the link above to read the entire article.

Cyber Resilience

In their article, Why Cyber Security Is Not Enough: You Need Cyber Resilience, Matthew Goche and William Gouveia presents rational and plan for Cyber Resilience. They begin "It’s true. Cyber attackers have an edge on you. Just look at recent incidents of credit card information being stolen from Target and SnapChat users' names and cell phone numbers being published online."
Click on the link above to read the entire article and/or get the 4 steps to cyber resilience below.
        4 Steps to Taking Control with Cyber Resilience"

Hottest Job in IT

"In a tight job market, security pros are paid well, rate job satisfaction high, and will make a move for money, according to Survey: With all eyes on security, talent shortage sends salaries sky high.
Digging into the data, we find that information security manager is the hottest job in IT"
Salary Survey 2016: How does your compensation stack up?
        By Amy Bennett, CSO, InfoWorld

Encryption is not the enemy

"Our politicians help the terrorists every time they use fear as a campaign tactic.... The surest defense against terrorism is to refuse to be terrorized. Our job is to recognize that terrorism is just one of the risks we face, and not a particularly common one at that. And our job is to fight those politicians who use fear as an excuse to take away our liberties and promote security theater that wastes money and doesn't make us any safer. " Security expert Bruce Schneier as quoted by Caroline Craig, InfoWorld - Read More

Take a look. What do you think? Come prepared to discuss.

After Paris: Liberté demands unlimited encryption

"The neocons are at it again: After the tragedies of the terrorist attacks in Paris last Friday (and Beirut the day before), they're arguing that governments need to be able to access all communications from everyone, purportedly to protect us from future terrorist attacks" By Galen Gruman, InfoWorld - Read More

Take a look. What do you think? Come prepared to discuss.

NSA uses the vulnerabilities to make its own cyber-attacks

"The U.S. National Security Agency, seeking to rebut accusations that it hoards information about vulnerabilities in computer software, thereby leaving U.S. companies open to cyber attacks, said last week that it tells U.S. technology firms about the most serious flaws it finds more than 90 percent of the time. -- " Reuters - Read More

Take a look. What do you think? Come prepared to discuss.

Revealed: how US and UK spy agencies defeat internet privacy and security

"US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden." The Guardian - Read More

Take a look. What do you think? Come prepared to discuss.

Remember, this is a dynamic website.  Visit often.