Learning Cyber Security Part 2


Picking up where I left off here about computer’s and Cyber Security. Starting out in the class I did not know many of the terms that were talked about at the beginning. Now, with a little over a year of working in the class and learning the different concepts and how they all coincide with everything pertaining to computer’s.  It has been interesting to do the lab simulations to show myself how much I did not know about how to configure my own computer. For years, I have bought computer’s and did not know anything but the basics. Now I can do many things with the knowledge that I have learned on how to keep my family, finances, and computer safe. It seems like the more I learn the harder it is to stay protected with all the new threats out in the world today.

If someone had come up to me a year ago and asked me about Cyber Security I would not have been able to tell them one thing about it. For example, RIPEMD is a suite of cryptographic hash functions developed that is based upon MD4. I would have never know what that was or even heard of it along with other items that I will discuss throughout this journey. There is tons of information about everything that I am learning throughout this course. I have never been overwhelmed at the wealth of information right in front of us and also wonder why people do not safe guard themselves from the bad people in the world.

So in building my computer I have went with Linux because I love it! However, I did not know much about it especially when it came to the commands that you have to use in order to do things as an administrator. It is funny because I could use some commands when it comes to windows because some of them were self explanatory. For example, NetCat in the command line is used to perform a port scan on your computer. It will give you a list of ports that are on your computer. Nmap is used for discovering hosts and services on your network. So many different varieties of commands that you can use in the command prompt to see who is watching you or connecting to your computer. Some of the other commands that you can use to configure your computer can become quite useful when it comes to configuring your adapters, viewing the TCP/IP configuration settings, and seeing the MAC addresses.

All of these commands may seem a lot to take in and remember especially if you are not using them on a daily basis. Right now I have to look in the books to figure out which one to use to complete a lab that is because I do not use these codes enough in the field that I am currently in at this moment. Hopefully, with the knowledge that I am gaining in class along with the expertise I will be able to use this information later on when and if I find that job that I am looking for to further my career.  There are many other command prompts that you can use in Linux.  Another example would be tracert which displays the route taken by the IP  packet on its way to another host. In reading the text I also found that using Netstat can be used for displaying the active TCP/IP connections that are on your computer.

Alright, round two is done for tonight. More to come as I embark on this wonderful exciting journey.