Category: Technology

0

2015 a brand new year

Happy New Year Everyone, It has been quite some time since my last post here on my blog. The last time I posted anything was back in August of 2014. That was approximately 6 months ago. Many things have gone on since then. I was very busy. Between work and school, I did not have that much time to post anything. Now that the New Year has passed, I will try to do my best to update this blog regularly. In current news, I am 6 weeks into the January session in school. I am taking classes for Linux Administration...

0

Data Security and PKI

Data security is very important. Keeping sensitive data secure is essential to protecting a company’s proprietary data from rival companies or from hackers. The best way to keep data secure is to implement data encryption using a public key infrastructure system. By utilizing PKI standards in addition to utilizing proper security policies and procedures, data integrity can be kept while minimizing possible data breeches (Wikipedia, 2014). PKI utilizes two different types of keys. The key types are Asymmetric and Symmetric. Both key types are used to help validate users against and establish a trust between the certificate authority and the end...

0

Computer Security Case Study #2

I have been writing many essays as part of of the security class I am taking at DeVry. I thought I would share my essays for all to read. Computers and networks have become an essential asset to many of the businesses in the world today. Customer, financial, stock, corporate and proprietary information that used to be limited to a few individuals can be accessed by many people. The people that have access to the data can have the proper clearance to view it while others may not. There is an inherent risk with having computers and network handle the...