Azure, Technology

1. Azure Concepts

Overview of Azure Services The Core Services of Azure: Virtual Machines Virtual Networking Storage Almost every service in Azure is built on one or more of these. Azure VM and APP Services What is a Virtual Machine? (assuming if you are studying this course you already know what a virtual machine is…) Windows or Linux Can be accessed using RDP…

Continue Reading
PowerShell, Technology, Uncategorized

PowerShell Resources

As a Sys Admin, I am probably a bit late to the party with how useful PowerShell can be. I have lately completed a couple of online courses about PowerShell and am trying to use it as much as I can in my day to day work. I am finding it incredibly useful in work and relatively easy to pick…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 6.7 Cryptographic Applications

1. Digital Rights Management Digital Rights Management, or DRM software mechanisms, provide content owners with the technical ability to prevent the unauthorised use of their content. DRM uses encryption technology to render content inaccessible to those who do not possess the necessary license to view the information. Apple and many other subscription-based music services do use DRM technology to encrypt…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 6.5 Public Key Infrastructure (PKI)

1. Trust Models Requirements for Symmetric Key Exchange: The 2 parties must be confident that they are really communicating with each other and not an imposter The 2 parties must be confident that nobody is eavesdropping on the key exchange Asymmetric Cryptography Users don’t need to share their private keys Users can share their public keys freely Eavesdropping protection isn’t…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 6.4 Key Management

1. Key Exchange In symmetric encryption, the sender and receiver share a single secret key that nobody else should know. Before the sender and receiver can begin to communicate using a symmetric algorithm, they must somehow agree upon and exchange the shared secret key that they will use for that communication session. Problems with Key exchange EG: Alice and Bob…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 6.2 Symmetric Cryptography

1. Data Encryption Standard (DES) DES was designed by IBM in the 1970’s Intended to serve as a federal encryption standard. Up until that point different agencies used different encryption algorithms. This caused issues with security because all of those algorithms weren’t thoroughly tested, and interoperability because different agencies couldn’t easily communicate with each other How DES Works DES uses…

Continue Reading
Comptia Security+, Security, Technology

Security+ Course – 6.1 Encryption

1. Understanding Encryption Cryptography is the use of mathematical algorithms to transform information into a form that is not readable by unauthorised individuals. Cryptography does, however, provide authorised individuals with the ability to transform that encrypted information back into readable form. Encryption: converts information from its plaintext form into an encrypted version that is unreadable. This is known as ciphertext…

Continue Reading