20 episodes

iDigitalClassroom is a reliable source of first-class remote learning and remote work resources where eLearning content creators and remote technology providers are empowered by providing insight from a user perspective to enable the production of engagement tools and resources. Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support

Idigital Classroom Joy Alatta

    • Education

iDigitalClassroom is a reliable source of first-class remote learning and remote work resources where eLearning content creators and remote technology providers are empowered by providing insight from a user perspective to enable the production of engagement tools and resources. Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support

    Basic Principles of Information Security

    Basic Principles of Information Security

    Information is the lifeline of an organization. Think about what blood does to a human being. That is actually how the data and information that flow through our network is importance for our organization. Data and information are essential in our private lives as we monitor our homes using remote cameras. We want to know where our kids are, what they are doing, or where they are hanging out. We want to know where our vehicles are parked and the things happening around them. So, the information we are tracking must be secure because it can be compromised if it is not secure. And if it is compromised, it would not serve the purpose for which we need the data or information.


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support

    • 19 min
    Identifying the IT Infrastructure for IT Security

    Identifying the IT Infrastructure for IT Security

    As you can see in today's world, so many devices are now classified as a computer. In the past, people think that the computer is the big bulky device you see on tables in many offices and organizations. You are right. Those devices are still considered computers. However, many other devices are now behaving and acting the same way those computers act. There are several devices that make up the Information Technology infrastructure for a business or an organization, even for individuals. In today's world, people store their files and their digital assets in the cloud, and some use data centers. Some companies manage data in the cloud. IT infrastructure could be your computers, your tablet, your PC, or even your smartphone. Then there are the servers which are used as storage facilities. You think about the various devices you use for communication as computing infrastructure. Also, information technology is what we used to carry out or perform job tasks...More


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support

    • 20 min
    Use Defensive Cybersecurity to Mitigate Cyber attack

    Use Defensive Cybersecurity to Mitigate Cyber attack

    It is essential to understand what could go wrong in a system and to use mitigation action to protect the system from potential threats. In recent weeks you may have heard of an incident that explained why there is a need to take a defensive approach to protect your digital assets and infrastructures. The incident is that of Kaseya. Wired.com reported that the Kaseya was warned by the Dutch Institute for Vulnerability Disclosure that there was a potential vulnerability in its system. In this case, Kaseya did not ignore the warning, but Kaseya did not move first to patch up the exposure...More


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support

    • 11 min
    The Human Factor in a Ransomware Attack Part-2

    The Human Factor in a Ransomware Attack Part-2

    Kaspersky Lab conducted a study to determine what role employees play in a business's fight against cybercrime. The study used over 5,000 businesses around the globe and found out that (52%) of the businesses surveyed believed they are at risk from within and that their employees either intentionally put the businesses at risk or are put the businesses at risk through carelessness or lack of knowledge.

    The question that comes to mind after reading that report is why employees are responsible for so many security breaches? Is it fair or proper to say that employees are lazy? Or that they do they just not care what risk they expose their employer?

    What do you think of the result of that report?


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support

    • 10 min
    The Human Factor in a Ransomware Attack Part-1

    The Human Factor in a Ransomware Attack Part-1

    Ransomware is a type of malware that creeps into a network, scans the network to identify targets, and then uses encryption to seize all or some parts of the network. Thus, the victim's information is held at a ransom. After encrypting the files, the attacker becomes the only one with the decrypting key. In a network that experienced a ransomware attack, the system owner will not be able to have access to the files, databases, or applications. The attacker then resumes operation by demanding ransom.

    Ransomware works by spreading across a network with the aim of paralyzing the network. In a ransomware attack, the attacker uses asymmetric encryption. Asymmetric encryption is a type of cryptography that uses a pair of keys to encrypt and decrypt a file. The pair of keys are a private and a public key, and the attacker uniquely generates both keys. The private key will be required to decrypt the files, and it may be nearly impossible to decrypt the files without the private key. Imagine a situation where someone creeps into your house, changes the locks on the doors, and sends you a message to pay some ransom before you get a key to unlock your home. Often, the attacker will contact the victim on how to pay a ransom to receive the private key with which to decrypt the files or seized assets.


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support

    • 18 min
    Gathering Penetration Testing Intelligence from Network and Application Platform Configuration

    Gathering Penetration Testing Intelligence from Network and Application Platform Configuration

    Network configuration refers to the process of setting a network's controls, flow, and operation to support the network infrastructure of an organization or for an individual owner.

    Components of a computing network include Internet/network protocols, software or application, firewall, routers, and others that perform related tasks. Most network configurations are designed to meet communication objectives. For example, the router is configured with the correct IP addresses and route settings to enable network connection and communication. Software is configured to monitor network-based activities and to detect intrusions to the network.

    Network configuration can be manual or automated, but the primary importance is maintaining a network and making changes when required. Other aspects of network configuration include the ability to launch and relaunch devices, track and report data. An automated network manager can make the task of configuration management easier to perform...More


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/digitalclassroom/support

    • 13 min

Top Podcasts In Education

The Mel Robbins Podcast
Mel Robbins
The Jordan B. Peterson Podcast
Dr. Jordan B. Peterson
Mick Unplugged
Mick Hunt
TED Talks Daily
TED
Do The Work
Do The Work
School Business Insider
John Brucato