<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: UnicodeRogue</title>
    <description>The latest articles on DEV Community by UnicodeRogue (@unicoderogue).</description>
    <link>https://dev.to/unicoderogue</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F344303%2F4d0fd4ad-23cd-4c14-8385-1306c73a2b13.png</url>
      <title>DEV Community: UnicodeRogue</title>
      <link>https://dev.to/unicoderogue</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/unicoderogue"/>
    <language>en</language>
    <item>
      <title>Perimeter Security notes</title>
      <dc:creator>UnicodeRogue</dc:creator>
      <pubDate>Sun, 08 Mar 2020 23:45:53 +0000</pubDate>
      <link>https://dev.to/unicoderogue/perimeter-security-notes-811</link>
      <guid>https://dev.to/unicoderogue/perimeter-security-notes-811</guid>
      <description>&lt;h2&gt;
  
  
  Firewalls
&lt;/h2&gt;

&lt;p&gt;Section and protect&lt;br&gt;
Three main types:&lt;br&gt;
Hardware-based- a standalone device that's part of your network stack&lt;br&gt;
Software-based- run as a piece of software on a host or server&lt;br&gt;
Embedded- work as a single function out of many on a single device- like a firewall that comes with a home router&lt;/p&gt;

&lt;p&gt;Packet filtering- Inspects packets, accepts or rejects based on rules&lt;br&gt;
Inbound Port 80 and Port 443 commonly used&lt;br&gt;
Two types- stateless and stateful packet filtering&lt;br&gt;
Stateless Packet Filtering- accept or reject based on IP address and port requested&lt;br&gt;
Stateful Packet Filtering- tracks requests &lt;em&gt;leaving the network&lt;/em&gt; used to eliminate IP spoofing&lt;/p&gt;

&lt;p&gt;NAT filtering- filters traffic based on port and TCP or UDP connection&lt;/p&gt;

&lt;p&gt;Application layer gateway- applies security mechanisms to specific applications. Resource-intensive, but is powerful. &lt;br&gt;
Application layer gateway is a layer 7 firewall&lt;/p&gt;

&lt;p&gt;Circuit-Level gateway works at session layer, ONLY inspects traffic during the establishment of the session over TCP or UDP&lt;/p&gt;

&lt;p&gt;MAC filtering- filtering and preventing access based on MAC address&lt;/p&gt;

&lt;p&gt;Access Control List: allow, explicit allow (example &lt;code&gt;allow TCP 10.0.0.2 any port 80&lt;/code&gt;, explicit deny (example &lt;code&gt;deny TCP any any port 23&lt;/code&gt;) implicit deny (&lt;code&gt;deny TCP any any port any&lt;/code&gt;). &lt;/p&gt;

&lt;p&gt;Firewalls process traffic from first rule to last rule, when it meets a rule that matches, it stops the traffic&lt;/p&gt;

&lt;p&gt;Layer 3- blocking IP addresses&lt;br&gt;
Layer 4- blocking ports&lt;/p&gt;

&lt;p&gt;WAF- web application firewall- installed on your server, inspects data being sent to and from. Useful to prevent XSS and SQL-injection attacks&lt;/p&gt;

&lt;p&gt;Honeypots and honeynets&lt;br&gt;
Use to attract and catch a would-be attacker&lt;/p&gt;

&lt;p&gt;Honeypot: A single computer/file/group of files, or IP range that might be attractive to an attacker&lt;/p&gt;

&lt;p&gt;Honeynets: A group of computers, servers, or an area of a network being used to attract&lt;/p&gt;

&lt;p&gt;DLP systems- data loss prevention- analyze what's being sent out- also known as extrusion prevention systems (EPS) or Information Leak Protection (ILP)&lt;/p&gt;

&lt;p&gt;Network based IDS- (NIDS) Attempts to detect, log, and alert on malicious network activities- like port scans and denial of service attacks- can be placed before or behind firewall. Can only detect, can't act, can only log&lt;/p&gt;

&lt;p&gt;Network based IPS- (NIPS) Designed to inspect traffic AND, based on its configuration, attempts to remove, detain, redirect malicious traffic. NIPS can also perform functions as a protocol analyzer&lt;/p&gt;

&lt;p&gt;Unified Threat Management- because one firewall is not enough! UTM is a single device that combines many other devicies and technologies into it- like firewall, NIDS/NIPS, content filter, anti-malware, DLP, VPN, often has a GUI instead of command line&lt;/p&gt;

&lt;h2&gt;
  
  
  Cloud computing
&lt;/h2&gt;

&lt;p&gt;Cloud computing is a way of offering on-demand services that extend the traditional capabilities of a computer or network&lt;/p&gt;

&lt;p&gt;Cloud computing relies heavily on virtualization&lt;/p&gt;

&lt;p&gt;Microsoft Azure uses Secure Enclaves&lt;/p&gt;

&lt;p&gt;Secure Volumes though, are a method of keeping data at rest, secure from prying eyes&lt;/p&gt;

&lt;p&gt;Four different cloud types: Public, Private, Hybrid, Community&lt;/p&gt;

&lt;p&gt;Google Drive is a Public Cloud service&lt;/p&gt;

&lt;p&gt;Private- used by companies for example, with their own environment, servers, and resource use- US Government. Private clouds are chosen when security is more important than cost&lt;/p&gt;

&lt;p&gt;Hybrid- mixture, rules about what type of data is hosted where&lt;/p&gt;

&lt;p&gt;Community cloud- resources shared&lt;/p&gt;

&lt;p&gt;SaaS- ordered from least to most vendor-equipped&lt;/p&gt;

&lt;p&gt;IaaS&lt;/p&gt;

&lt;p&gt;PaaS&lt;/p&gt;

&lt;p&gt;SECaaS- Security as a Service- anti-malware products. Upside- quick updates. Downside- highly reliant on an internet connection.&lt;/p&gt;

&lt;p&gt;65,536 ports for a computer to use&lt;/p&gt;

&lt;p&gt;35 are worth memorizing&lt;/p&gt;

&lt;p&gt;Source:&lt;br&gt;
CompTIA Security+ (SY0-501)&lt;br&gt;
&lt;a href="https://www.udemy.com/course/securityplus/"&gt;https://www.udemy.com/course/securityplus/&lt;/a&gt; &lt;/p&gt;

</description>
      <category>security</category>
      <category>studying</category>
      <category>network</category>
      <category>firewall</category>
    </item>
    <item>
      <title>Security study notes</title>
      <dc:creator>UnicodeRogue</dc:creator>
      <pubDate>Sun, 08 Mar 2020 22:11:26 +0000</pubDate>
      <link>https://dev.to/unicoderogue/security-study-notes-19i3</link>
      <guid>https://dev.to/unicoderogue/security-study-notes-19i3</guid>
      <description>&lt;p&gt;What's an SDK- An SKD is a software development kit&lt;br&gt;
What is an ACL- An ordered set of router rules that will permit or deny traffic based upon certain characteristics&lt;/p&gt;

&lt;p&gt;Waterfall is big&lt;br&gt;
Good for when security is needed&lt;/p&gt;

&lt;p&gt;Agile is faster than waterfall&lt;br&gt;
Agile uses sprints&lt;/p&gt;

&lt;p&gt;DevOps&lt;br&gt;
Development and Operation&lt;br&gt;
Speed up&lt;br&gt;
Good to have a security person involved&lt;/p&gt;

&lt;p&gt;CIA triad- confidentiality, integrity, availability&lt;/p&gt;

&lt;p&gt;Least privilege&lt;/p&gt;

&lt;p&gt;Defense in depth- layered security&lt;br&gt;
Don't trust user input- do input validation to protect against SQL injections, buffer overflows&lt;/p&gt;

&lt;p&gt;Input validation is what I work on now! &lt;/p&gt;

</description>
      <category>security</category>
      <category>firewall</category>
      <category>network</category>
      <category>studying</category>
    </item>
    <item>
      <title>Top ten tips for studying for Security+ exam in 2020</title>
      <dc:creator>UnicodeRogue</dc:creator>
      <pubDate>Sun, 01 Mar 2020 22:38:34 +0000</pubDate>
      <link>https://dev.to/unicoderogue/top-ten-tips-for-studying-for-security-exam-in-2020-5e56</link>
      <guid>https://dev.to/unicoderogue/top-ten-tips-for-studying-for-security-exam-in-2020-5e56</guid>
      <description>&lt;p&gt;This is my first Dev.to post! &lt;/p&gt;

&lt;p&gt;I'm studying for the Security+ exam. &lt;/p&gt;

&lt;p&gt;Here are my top ten recommendations for anyone studying:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Study with a group. Life events have a way of always happening, and a group is a good way to stay on track, be encouraged, and have people around you with the same goals.&lt;/li&gt;
&lt;li&gt;Food matters. Take care with what you eat, especially while studying. Things to keep in mind with food really range from blood sugar crashes to messy food getting on a laptop. &lt;/li&gt;
&lt;li&gt;Sleep matters too! You can't add much to a tired brain. &lt;a href="https://www.health.harvard.edu/blog/sleep-helps-learning-memory-201202154265"&gt;Sleep helps you learn.&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Write as you go- this is a good way to remember what you're reading or seeing on video. &lt;/li&gt;
&lt;li&gt;Especially write down new terms!!!&lt;/li&gt;
&lt;li&gt;Track your progress. There will always be more to learn, it's good to be able to see how much you've done so far&lt;/li&gt;
&lt;li&gt;Take breaks- brains learn better when you take breaks and review the material again. I liked &lt;a href="https://www.fastweb.com/student-life/articles/energizing-study-break-ideas-what-to-avoid"&gt;this post&lt;/a&gt; for ideas on what types of breaks are especially useful&lt;/li&gt;
&lt;li&gt;Learn in different formats. Read, watch videos, explain a term to someone else, draw a concept, the important thing is to keep using your brain as you go&lt;/li&gt;
&lt;li&gt;Ask for help (and say thank you when you get it!) There are lots of helpful people around who will share their knowledge. Asking for help gives them a chance to help you- which is voluntary, so make sure to say thank you. &lt;/li&gt;
&lt;li&gt;Say thank you to yourself. There is so much to learn, and there will always be more to learn- that's a guarantee! Don't beat yourself up if you're not as far along as you want to be. Say thank you to yourself for taking the time to study. &lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>security</category>
      <category>2020</category>
      <category>studying</category>
      <category>productivity</category>
    </item>
  </channel>
</rss>
