Tristen D. Milliken is an information technology professional with over 7 years of experience in the United States Navy as an Information Systems Technician, where he most recently served as a Tier II Technical Support Supervisor. He has extensive experience in hardware, software, networks, databases, and troubleshooting technical issues. He is seeking a full-time position utilizing his skills in customer service, technical support, and information technology.
Information and network security 6 security attacksVaibhav Khanna
Network security attacks are unauthorized actions against private, corporate or governmental IT assets in order to destroy them, modify them or steal sensitive data
Information and network security 4 osi architectureVaibhav Khanna
The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as follows: Threats and Attacks (RFC 2828) Threat. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm
Information and network security 6 security attacksVaibhav Khanna
Network security attacks are unauthorized actions against private, corporate or governmental IT assets in order to destroy them, modify them or steal sensitive data
Information and network security 4 osi architectureVaibhav Khanna
The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as follows: Threats and Attacks (RFC 2828) Threat. A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm
Information and network security 5 security attacks mechanisms and servicesVaibhav Khanna
One approach is to consider three aspects of information security: Security attack – Any action that compromises the security of information owned by an organization. Security mechanism – A mechanism that is designed to detect, prevent or recover from a security attack
Information and network security 7 security servicesVaibhav Khanna
IT Security Services to Build Your Cybersecurity Foundation
Pre- and post-security and vulnerability assessments.
Incident response plan development.
Intrusion prevention and detection.
Remote access and mobility.
Endpoint protection.
Multi-factor authentication
Information and network security 1 introductionVaibhav Khanna
• Cryptographic algorithms: This is the study of techniques for ensuring the secrecy and/or authenticity of information.
• The three main areas of study in this category are:
• 1. symmetric encryption,
• 2. asymmetric encryption, and
• 3. cryptographic hash functions, with the related topics of message authentication codes and digital signatures.
This educational PPT provides Primary Goals of Network Security, The Security Trinity, Information Security, Risk Assessment, Security Models, Basic Security Terminologies, Threats, Vulnerabilities, and Attacks, Know Yourself - The Threat and Vulnerability Landscape, Privacy, Anonymity and Pseudo-anonymity, Security, Vulnerabilities, Threats and Adversaries, Know Your Enemy - the Current Threat and Vulnerability Landscape, Security Bugs and Vulnerabilities - The Vulnerability Landscape, Malware, viruses, rootkits and RATs
Spyware, Adware, Scareware, PUPs & Browser hijacking, Phishing, Vishing and SMShing, Spamming & Doxing, Security services, Policy, Mechanism, and Standards, and the basic principles and steps of System development. Besides, because of covering the most basic and advanced network and computer security issues, policies, and principles in easy way, it can help you to create an awareness how to use an internet and how to protect your physical as well as logical assets.
Information and network security 2 nist security definitionVaibhav Khanna
Protection against intentional subversion or forced failure. A composite of four attributes – confidentiality, integrity, availability, and accountability – plus aspects of a fifth, usability, all of which have the related issue of their assurance
Information and network security 3 security challengesVaibhav Khanna
Misconfiguration. Misconfigurations of cloud security settings are a leading cause of cloud data breaches.
Unauthorized Access.
Insecure Interfaces/APIs.
Hijacking of Accounts.
Lack of Visibility.
External Sharing of Data.
Malicious Insiders.
Cyberattacks
Ethical hacking-Introduction to information security.Kamana Tripathi
Information Security : Attacks and Vulnerabilities.
Introduction to information security : Asset, Access Control, CIA, Authentication, Authorization, Risk, Threat, Vulnerability, Attack, Attack Surface, Malware, Security-Functionality-Ease of Use Triangle.
Information and network security 5 security attacks mechanisms and servicesVaibhav Khanna
One approach is to consider three aspects of information security: Security attack – Any action that compromises the security of information owned by an organization. Security mechanism – A mechanism that is designed to detect, prevent or recover from a security attack
Information and network security 7 security servicesVaibhav Khanna
IT Security Services to Build Your Cybersecurity Foundation
Pre- and post-security and vulnerability assessments.
Incident response plan development.
Intrusion prevention and detection.
Remote access and mobility.
Endpoint protection.
Multi-factor authentication
Information and network security 1 introductionVaibhav Khanna
• Cryptographic algorithms: This is the study of techniques for ensuring the secrecy and/or authenticity of information.
• The three main areas of study in this category are:
• 1. symmetric encryption,
• 2. asymmetric encryption, and
• 3. cryptographic hash functions, with the related topics of message authentication codes and digital signatures.
This educational PPT provides Primary Goals of Network Security, The Security Trinity, Information Security, Risk Assessment, Security Models, Basic Security Terminologies, Threats, Vulnerabilities, and Attacks, Know Yourself - The Threat and Vulnerability Landscape, Privacy, Anonymity and Pseudo-anonymity, Security, Vulnerabilities, Threats and Adversaries, Know Your Enemy - the Current Threat and Vulnerability Landscape, Security Bugs and Vulnerabilities - The Vulnerability Landscape, Malware, viruses, rootkits and RATs
Spyware, Adware, Scareware, PUPs & Browser hijacking, Phishing, Vishing and SMShing, Spamming & Doxing, Security services, Policy, Mechanism, and Standards, and the basic principles and steps of System development. Besides, because of covering the most basic and advanced network and computer security issues, policies, and principles in easy way, it can help you to create an awareness how to use an internet and how to protect your physical as well as logical assets.
Information and network security 2 nist security definitionVaibhav Khanna
Protection against intentional subversion or forced failure. A composite of four attributes – confidentiality, integrity, availability, and accountability – plus aspects of a fifth, usability, all of which have the related issue of their assurance
Information and network security 3 security challengesVaibhav Khanna
Misconfiguration. Misconfigurations of cloud security settings are a leading cause of cloud data breaches.
Unauthorized Access.
Insecure Interfaces/APIs.
Hijacking of Accounts.
Lack of Visibility.
External Sharing of Data.
Malicious Insiders.
Cyberattacks
Ethical hacking-Introduction to information security.Kamana Tripathi
Information Security : Attacks and Vulnerabilities.
Introduction to information security : Asset, Access Control, CIA, Authentication, Authorization, Risk, Threat, Vulnerability, Attack, Attack Surface, Malware, Security-Functionality-Ease of Use Triangle.
Seducir a una mujer todos los pasos que debes seguirNombre Apellidos
Descubre como conquistar una mujer con final seduccion que te muestra todas las técnicas ya probadas y practicadas por grandes seductores y te ayudaran a conseguir cualquier mujer que desees.
Read more: http://espanol.free-ebooks.net/my-desk#ixzz3c1fgiwRx
1. Tristen D. Milliken
4000 East 8900 South, Price, UT 84501 (757) 755-5993 tristen.milliken@gmail.com
Information Technology Professional
Current U.S. Government Top Secret/SCI Security Clearance
Driven, technical, and detailed oriented IT professional with 5+ years experience providing technical
support in a software technology environment. Retired Enlisted from the United States Navy with 7
years as an Information Systems Technician. Extensive technical background in hardware, software,
networks, database, telecommunications, analyzing, troubleshooting, and policies and procedures
development. Strong ability to learn quickly and relate to others at all levels. Highly experienced in
customer-focused positions. Excellent written, oral, leadership, and people skills. Available for fulltime
position August 1, 2015.
Professional Work Experience
United States Navy – Naval Medical Center Portsmouth October 2012-Present
Tier II Technical Support Supervisor - Petty Officer Second Class Information Systems Technician
♦ Managed and supervised 40 work center personnel on the resolution of daily help desk tickets.
♦ Trained 90 technicians on applying diagnostic techniques to identify problems, investigate
causes, and recommend and implement solutions to correct common failures.
♦ Assigned, created, and resolved trouble tickets through the Oracle Remedy Ticketing System.
♦ Created Standard Operating Procedures for help desk troubleshooting on PC hardware,
Windows operating systems, and Microsoft Office/Outlook applications.
♦ Provided escalation management on customer’s issues from Tier I through Tier III technical
support.
♦ Coordinated a 2,500 computer life-cycle refresh, effectively interfacing with cross-functional
teams.
♦ Repaired Dell and HP computer hardware, and reimaged computers with Microsoft Windows XP
and Windows 7 software.
♦ Provided remote support and troubleshooting to technicians and end users.
♦ Daily customer interaction on tracking their issues and providing information on its escalation.
United States Navy – USS Dwight D. Eisenhower December 2008-October 2012
Communications Supervisor - Petty Officer Second Class Information Systems Technician
♦ Designed, installed, operated, and maintained state-of-the-art information systems technology
including local and wide area networks, mainframe, mini and microcomputer systems, and
associated peripheral devices.
♦ Operated and coordinated telecommunication systems including automated networks and the
full spectrum of data links and circuits.
♦ Transmitted, received, operated, monitored, controlled, and processed all forms of
telecommunications through various transmission media including global networks.
♦ Provided telecommunications and computer-related training and assistance to a wide variety of
personnel.
Technical Training
♦ High Frequency Radio Group Communications User (6 weeks)
2. Tristen D. Milliken
4000 East 8900 South, Price, UT 84501 (757) 755-5993 tristen.milliken@gmail.com
♦ Global Broadcasting System Communications Security User (3 weeks)
♦ Microsoft, Cisco, and Oracle software and hardware fundamentals, ADP, security, system
theory, and operation (24 weeks)
♦ Journeyman Communication Course (18 weeks)
♦ Digital Wideband Transmission System (DWTS) Operator (4 days)
♦ Digital Modular Radio (DMR) (4 days)
♦ Commercial Broadband Satellite Program (CBSP) Unit Level (12 days)
♦ Secure Voice Telecommunications (2 weeks)
♦ HIPPA Hospital Employee Training (3 days)
Qualifications
♦ Seven years technical experience with software, hardware, networks, databases, and desktop
troubleshooting
♦ Lean Six Sigma – White/Yellow/Green Belt (40 hours)
♦ Professional Leadership Training (14 hours)
♦ Department of Labor Employment Workshop (3 days)
♦ Proficient in Microsoft Windows XP and Windows 7 Enterprise troubleshooting
♦ Proficient in OS X systems
♦ Excellent ability to quickly learn new programs and systems
♦ Ability to multi-task in fast paced and high pressure environments
♦ Comfortable with working independently as well as in team environments
♦ Seven years experience in customer focused positions