I am dealing with Emerging Threats and countermeasures.
This subject basically deals with the cyber-attacks and sharp actions for its
solution. I have learned many new concepts from this course, and it is also one
of the most interesting courses for observing. There is a number of theories I
have learned, but this report deals with the practical application of these
theories. But, currently, I am not working, but I have observed these theories
many times.
In my course, chapter 6 deals with the depth defense.
I have seen this theory in different movies especially in “Mission Impossible
Rogue nation.” When the main character wanted to achieve that chip from their
system, then its companion hacks the system and allow the character to gain
that chip. But in case the system managers saw the defense failure immediately.
For instance, they put a series of protective elements and enables the system
again. This depth in the defense system creates a huge problem for the main
character.
The next theory from my course I have analyzed is
related to the collection. In that theory, the data is collected through
different means and converted into an organized manner. The theory I have observed
during the internship is in the national data organizer. In that organization,
I have observed how the data organizer programs work. I have observed that they
have collected data from different means and then organized in a well-mannered
way for the analysis. Moreover, this collection theory I have also observed in
different movies from these movies I will mention only one, and that is “Die
Hard 4” in that movie, the evil character hacked the national security data and
collected the data about any individual that he wanted. In that movie, I have
observed different theories related to my source. This movie gave me vast
information related to the cyber-attacks on the collecting system data.
The next
theory I have observed practically is related to diversity. This theory I have
observed is related to a different computer software application. These
applications allow the user to search safe and enhance computer security.
Moreover, another course theory I have analyzed, and that is related to the deception.
This is one of the most important theories, and I have observed practically
during the documentaries related to deception. This can be observed in huge
technological websites like Google and Microsoft. If someone tried to hack
these websites, then through the help of their deception wall, the identity is
completely changed, and the user is distracted from the main goal of hacking
their websites.
They have created a deception liked through this. These
managers are able to protect their site from any kind of attack. Another theory
I have observed practically is related to correlation. This theory I also observed
in different movies. These movies showed how the different security agents
companies are able to protect their system by correlation. All of these
theories will help me during my employment, and through these skills, I am able
to learn different things quite quickly and efficiently.