F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
definition: types of security,media stories,goals of computer security,security basics,some of types attack,network attacks,web attacks,os,application and software are attacks,social engineering:network attacks ,packet sniffing,main in the middle,dns hacking......conclusion
this ppt is on the topic of system security. there are some topic which are introduce very nicely.there are some commont topic introduce in the
1. firewall
2.antivirus
3.malware
and IOT
these are the sub topic..
Peruse the slides to see Aventis Systems give a quick overview of Symantec Endpoint Protection 14, and learn why it’s so important to protect your endpoints.
definition: types of security,media stories,goals of computer security,security basics,some of types attack,network attacks,web attacks,os,application and software are attacks,social engineering:network attacks ,packet sniffing,main in the middle,dns hacking......conclusion
this ppt is on the topic of system security. there are some topic which are introduce very nicely.there are some commont topic introduce in the
1. firewall
2.antivirus
3.malware
and IOT
these are the sub topic..
Peruse the slides to see Aventis Systems give a quick overview of Symantec Endpoint Protection 14, and learn why it’s so important to protect your endpoints.
Deploying a MVC3 WebService in Windows AzureMahesh Dahal
The basic steps involved in packaging and Deploying a WebService to the Windows Azure Platform.
The steps are same for other website and webapps
Co-Authors : Sumit Tuladhar and Mahesh Dahal
iGEM IIT Kharagpur's Official Guide Book on Food SpoilageiGEM IIT Kharagpur
This booklet serves as an informative guide for families, restaurants and catering services (in general) to help them adopt healthy food practices, reduce contamination and spoilage of food items and spread awareness about the various diseases which are caused due to consumption of contaminated food products.
This has been made in a reader-friendly manner which enables even the simplest households to get a clear idea of the fundamentals of food spoilage.
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
Mohamed Bedewi, Offense Security Division Head and Sr. Penetration Testing Consultant at DTS presented also during one of the security sessions titled - "Your Network in the Eyes of a Hacker – The 0ff3ns!v3 Version" which raised a few eyebrows to say the least. The presentation slides can be found here….
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
Work-in-Progress!
IoT Cyber+Physical+Social Security
An encyclopedic compendium of tools, techniques, and practices to defend systems that sit at the intersection of the cyber and physical domains; chiefly building automation systems and the Internet of Things.
1. Joshua K Young
409 North Levitt Street, Apt 6, Rome NY 13440
(315) 489-3362
felexir@yahoo.com
http://www.linkedin.com/in/jyoung91
OBJECTIVES:
I would like to become a valuable asset to your organization and use my experience to add to my knowledge of computers and computer
softwareand to pursuea career in cyber security.
CLEARANCE: Secret
KEY SKILLS:
Software and Programs: Microsoft Office, Nmap, Metasploit, Netcat, Wireshark, Burp Suite, Nexpose, Nessus.
Systems: Windows Vista, XP, 7, and 8. Ubuntu, Kali, Backtrack, Parrot OS, Fedora, Linux
Troubleshooting: Knowledge and experience in maintaining and repairing most computer hardware problems including re-imaging,
soldering, and replacing parts and components, as well as basic electronics and circuit principles.
Radio: Knowledge and experience of the Harris radios including ANW2 networking, programming, and troubleshooting of the radios.
Security: Knowledge and experience in Security principles, including virus protection and systemsecurity measurements and
precautions. Knowledge of vulnerability analysis and systemhardening. Knowledge of incident response, information assurance ethics,
policies, and disaster recovery.
Networking: Knowledge and experience with networking principles including subnetting, TCP/IP, router, switch, and firewall
configuration. Knowledge of Virtualization. Knowledge and experience in VOIP/Call manager.
Cable: Past ETA Certified Fiber Optics Installer. Experience in CAT 5 cables.
Information Systems: Knowledgeand experience in basic skills of micro-computing and softwareutilities, assembly/disassembly of
microcomputers, data communication, local area networks, problem solving structured design techniques, database systemdesign and
development.
Communication: Excellent peopleskills from dealing with multiple clients with computer related issues.
Programming: Basic HTMLand CSS programming using Dreamweaver. Python, Ruby, and basic C programming skills.
EXPERIENCE:
Cyber Engineering Intern at Alion Science andTechnology 2015-Present: I work as a cyber security engineer, developing my skills
in information assurance, ethical hacking, and testing the security of Linux, Mac, and Windows machines. I work as a member of a team
developing products that help prevent malicious behavior or unauthorized access in computer systems and worked on research and
development programs.
Projects: Alion Counter UAS Technology: An unmanned aircraft system(UAS), commonly known as drone, can be extremely
dangerous, and this effort allows peopleto do more than complain. The Alion C-UAS Technology is capable of autonomously detecting
the offending drone, breaking its data link to its controller, and issuing new commands to safely land it.
25B (Information System Specialist) for427 BSB: 2013-Present as Army National Guard
Served in theCSSAMO (combat service support automation management office) section as a networking technician.
25B (Information System Specialist) for2-108 INF Battalion: 2010-Present as Army National Guard
I served as the primary Computer Specialist, providing computer support to 6 different companies during my deployment to Afghanistan.
I was theInformation Management Officer, working with the Air Force to create and maintain a strong secure network for military
operations throughout RC West. I completed the sanitization process of over 200 pieces of automation. I executed full data recovery and
systemrebuilds of over 140 laptops.
EDUCATION:
State University of New York Polytechnic: Working on a Bachelors in Network and Computer Security. Graduation date December
2016.
Advanced Individual Training Military School (25B) 2010: Qualified as an Information Systems Specialist for theUnited States
Army.
Jefferson Lewis BOCES Technical Center2008-2010: Completed a two year Electronics Engineering course.