Cryptography

--Originally published at Título del sitio

In my opinion cryptography is one of the most interesting topics of the course and it is something that I already had a relationship with last semester in my subject of computational mathematics. My teacher explained some of the methods used and used for encryption of information and told us a lot about the Turing machine, which although used to solve algorithms was a key element in the Second World War to encrypt intercepted data . I could also see the Cesar cipher, used for a long time and actually very simple. Nowadays it is necessary to keep all information secure and cryptography must be essential to keep all the information we trust to the websites that we access safely.

In the semester, the school will provide important information about teachers and students and it is necessary to look for a tool that allows us to encrypt this data to keep them safe. As we will use NodeJS we will have to adapt a tool that allows us to use them and return the information as JsonWebTokenscrip

 


Security architecture and policies

--Originally published at Título del sitio

The design of a computer security architecture helps to understand the risks to which the information of an organization is exposed, in order to establish the procedures that will help to eliminate them.

In my opinion you should have 3 essential criteria that are
Confidentiality Only authorized persons can access the data.

Integrity. The data must be authentic and can not be changed without permission.

Availability. Make the data available to the right person at the time you require it.

Risk management, and assessment

--Originally published at Título del sitio

Everyday, all the time the information is exposed to be attacked for differents motifs, and this represent a lot of risks according the institute of software engineering of Carnegie Mellon risk is the possibility of suffering damages or losses for human agent or not.
The selection and specification of security controls for a system is accomplished as part of an organization that involves the management of organization risk and is a key element in the organization’s information security program and provides an effective framework for selecting the appropriate security controls for a system.

The Risk Management Framework provides a process that integrates security and risk management activities into the system development life cycle that utilice for prtotect the information.

Categorize,Select, Implement, Assess,Authorize,Monitor are paramount to an effective information security program and can be applied development life cycle.


WSQ2: Computing Ethics

--Originally published at Título del sitio

ALBERTO————————-

Talk about ethics or moral in technology is a big challenge because we have a lot of ways to analyze, for example in our country Mexico, who is a crime? in base of Federal Penal Code article 7, crime is the act or omission that sanction criminal laws (Jimenez, ND). But in the technology area Mexico is growing because until 2013 the government of Peña Nieto modified some articles in the constitution to include topics about telecommunications like the access to internet, publications or opinions (Cuervo, 2014).

With this information, we find a topic that is controversial in the technologies, the information that we could share, copy, get or use because all new technologies give us access to lot of information like audios, movies, videos, articles, books, publications, etc. All information has an author or owner in consequence this information is not available to get free and we need to pay but people find methods to share information and break the law. One of the most recent and important examples is the history of Aaron Swartz where he downloaded illegally the JSTOR data base and was incriminate for several crimes like computer fraud, wire fraud, criminal forfeiture, etc and the interesting is that most of the charges were based on a law from 1986 and we don’t know is was justice or not.

We share information in many places and is our right but we need to know where is our limit and here is where the ethics are important because in our country is easy download or share file and could be in an illegally way is our decision if we do these actions or not.

 

Fernando——–

When it comes to talking about computer ethics is very complicated, because as a computer user some things that have

Continue reading "WSQ2: Computing Ethics"

Security ACI

--Originally published at Título del sitio

Since I was in high school I always believed that computer security was a very important part of the computer science, entering Tec de Monterrey always wanted to get to the subject of computer security. Well now is the time to know if this little curiosity that I have becomes complete in a future and as Bruce Schneier says develop that taste.
I have read several topics and articles about hackers and the tools they use for managing information, but I have not seen anything to put it into practice.
The finally having that matter and knowing the elements of AIC security I realize how solid this is, without these fundamentals and apply them during this semester i will be a challenge.
We will have to obtain data of the users, to create statistical data of the activities obtained within the application that we are going to realize.
It still sounds fairly simple in terms of security, but it will have to be polished and developed very in detail to expand it and make it better.