Friday, September 26, 2025

Locking the Gates: Defending Against Ransomware and Phishing

Introduction Information security is essential for both individuals and organizations because modern life depends on connected systems that collect, process, and store personal and business data. As the CompTIA text explains, online activity exposes far more about us than face-to-face transactions: websites and apps can infer identity from browsing history, purchases, location, and contact data, making our information valuable to both companies and cybercriminals (CompTIA, 2022). This paper explains why systems are vulnerable, outlines the damage caused by ransomware and phishing, and proposes practical defenses grounded in industry guidance. Why Information Security Matters CompTIA’s overview of personally identifiable information (PII) distinguishes between direct identifiers (such as Social Security numbers, account credentials, or driver’s license numbers) and indirect attributes (such as ZIP code, job title, or browsing history) that, when combined, still reveal identity (CompTIA, 2022). Organizations must protect both categories while maintaining the availability of systems that deliver services to employees and customers. Breaches can result in operational downtime, regulatory exposure, and loss of trust, while individuals may face identity fraud, damaged credit, or financial loss. Incident 1: Malware and Ransomware Ransomware attackers typically gain entry through stolen or phished credentials, unpatched software, or exposed remote services. Weak identity controls and broad user permissions increase the impact once an attacker lands on a single machine. Common signs include encrypted files, unusual file extensions, ransom notes, disabled security tools, and disrupted backups. The damage can include stolen or inaccessible data, interrupted services, and reputational harm. Federal guidance highlights that many groups now exfiltrate data before encrypting systems and use extortion threats to pressure victims (Cybersecurity and Infrastructure Security Agency [CISA], 2025). Recommendations for Ransomware Strengthen identity: Adopt multi-factor authentication (MFA) so logins require more than just a password. Combining factors—something you know, have, and are—raises the bar for attackers and helps prevent credential compromises (CompTIA, 2022). Prepare for recovery: Maintain offline or immutable backups and test restoration regularly so operations can continue even if primary systems are encrypted (CISA, 2025). Reduce attack surfaces: Apply patches promptly and enforce least-privilege access to limit lateral movement. Incident 2: Phishing and Smishing Phishing campaigns use deceptive messages—via email or SMS (smishing)—to trick users into revealing credentials, approving fraudulent sign-in prompts, or visiting spoofed websites. Attackers often mimic legitimate communications using details such as names, departments, or recent activities. This aligns with the text’s discussion of how indirect PII can be combined to create persuasive profiles (CompTIA, 2022). Outcomes can range from single-account takeovers to business email compromise and large-scale breaches. Industry reporting confirms phishing remains one of the most common pathways to intrusions across sectors (Verizon, 2025). Recommendations for Phishing Promote awareness: Train users to verify sensitive requests through separate channels and encourage them to navigate directly to trusted sites instead of clicking links. CompTIA emphasizes that every employee plays a role in spotting suspicious messages (CompTIA, 2022). Layer defenses: Deploy email and SMS filtering, domain protection, DNS/web filtering, and MFA to reduce the chance that a single click leads to compromise (Verizon, 2025; CISA, 2025). Conclusion Ransomware and phishing thrive when attackers exploit weak authentication, unpatched systems, over-privileged accounts, and rushed human decisions. CompTIA’s treatment of PII and authentication underscores the need to guard both the data and the identities that access it. Federal and industry guidance provide concrete strategies for resilience. Combining strong identity controls, tested backups, timely patching, least-privilege authorization, layered detection, and continuous user training is essential for protecting individuals and organizations in today’s data-driven environment (CompTIA, 2022; CISA, 2025; Verizon, 2025). References CompTIA. (2022). CertMaster Learn Tech+ [Course textbook]. CompTIA. Cybersecurity and Infrastructure Security Agency. (2025). #StopRansomware guide. https://www.cisa.gov/stopransomware/ransomware-guide Verizon. (2025). 2025 Data Breach Investigations Report (DBIR).

Managing the Invisible: How Network Management and Security Work Together

Why I Chose These Topics The two technology topics I selected for this assignment are network management and network security, both of which are directly relevant to the Cyber and Data Security Technology program. The connection between network security and the program is straightforward, since security is a foundational concern in all aspects of data protection. By contrast, network management may not at first appear directly connected to cybersecurity; however, it represents a critical foundation for protecting information systems. Understanding how networks are configured, monitored, and maintained is essential for ensuring their security. Recognizing how these topics intersect with the goals of the program was the primary reason for choosing them, although many of the available topics could be linked meaningfully to the discipline. Research on Network Management My initial research on network management began with Huawei Technologies’ (2023) Network Management, Operation and Maintenance. I expected that a broad internet search using the phrase “network management” would only provide surface-level definitions rather than a structured understanding of management practices. Starting with a specialized source gave me a more detailed introduction to the principles of network management. The text outlined the functional areas of the OSI network management model: configuration, fault, performance, security, and billing management. This framework reinforced the idea that maintaining secure systems requires not only technical controls but also disciplined organization and continuous oversight. Research on Network Security For network security, I turned to the Network Security Knowledge Area within the Cyber Security Body of Knowledge (CyBOK, 2021). This open-access resource provided a comprehensive overview of the core principles of network security, including common threats, defense mechanisms, and risk management strategies. Unlike vendor-specific materials, CyBOK organizes the field in a way that highlights universal concepts rather than product features. This aligns with the program’s emphasis on building foundational knowledge that can be applied across contexts. From this research, it is clear that while network management provides the structure for maintaining systems, network security ensures those systems remain resilient against attacks and unauthorized access. Key Question Moving Forward One guiding question that emerged from this research is: How do network management practices directly influence the effectiveness of network security controls? This question highlights the interdependence of the two topics. Poorly managed systems, for example, may suffer from misconfigurations that create vulnerabilities, while effective management practices can strengthen security posture by ensuring that patches, updates, and monitoring systems are consistently applied. Exploring this relationship further will deepen understanding of how cybersecurity professionals integrate technical and organizational practices. Connection to the Program In addition to these sources, the course text reinforces fundamental networking concepts and shows that management and security are not isolated areas but complementary aspects of ensuring reliable and safe communication systems. The integration of network management and security reflects the broader purpose of the Cyber and Data Security Technology program: to prepare students to safeguard data by combining technical expertise with structured operational practices. References Huawei Technologies Co., Ltd. (2023). Network management, operation and maintenance. In Data communications and network technologies (pp. 501–519). Springer. https://doi.org/10.1007/978-981-19-3029-4_16 International Organization for Standardization, & International Electrotechnical Commission. (1989). ISO/IEC 7498-4:1989 — Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework. ISO/IEC. https://cdn.standards.iteh.ai/samples/14258/356879966ac041b7bddc5b090a8467d9/ISO-IEC-7498-4-1989.pdf The Cyber Security Body of Knowledge (CyBOK). (2021). Network Security Knowledge Area (Version 2.0.0). University of Bristol. https://www.cybok.org/media/downloads/Network_Security_v2.0.0.pdf

Programming Languages

Programming Languages Experience Building a Program Using Scratch Initially, it was difficult trying to use Scratch. I approached the program by first planning what I wanted to do with a flow chart. This turned out to be harder than I expected. My limited understanding of Scratch made it challenging to translate shapes like ovals, parallelograms, diamonds, rectangles, and arrows into actions that could actually happen in the program. Even though I had read Chapter 10, mapping out a program sequence in a traditional way did not seem to line up with what I was doing in Scratch (CompTIA, 2022, 10.1). Because of these challenges, I decided to follow a tutorial instead. I chose to create a digital Pong game. Through this tutorial, I gained a better understanding of the importance of program sequence. The tutorial also helped me see how pseudocode could describe the logical flow of how my game worked (CompTIA, 2022, 10.1). My input was the click of the green flag. I had two sprites: a basketball and a basketball player. In the basketball block code, I used a loop to make the ball continuously bounce around the screen. Using an IF-THEN block, I set the ball to turn 180 degrees whenever it touched the basketball player. I also used a loop on the basketball player so it would move whenever my mouse moved across the screen. This made the game interactive and gave me a concrete way to see how logic translated into movement and outcomes in Scratch. As I worked in Scratch, it still felt like I was doing something completely different from coding. Dragging and dropping blocks felt simple on the surface, but it did not match the picture I had in my mind from the textbook. That left me questioning whether I was actually “coding” or just experimenting with a visual tool. Insights Gained About Programming What I learned is that while the symbols in flow charts are simple to understand on paper, adapting them into different programming software can create challenges. The Pong game taught me that sequencing matters—one misplaced block could change how the game worked. I also saw how loops and IF-THEN conditionals mirror the logic of pseudocode and flow charts, just in a visual form (CompTIA, 2022, 10.1). Scratch uses visual blocks, while other programming languages use text-based commands. The logic is the same, but the way it looks and feels is very different. Comparison With Other Languages Working in Scratch seemed entirely different from what I read about compiled, interpreted, assembly, and query languages in Section 10.1 of the textbook. For example, compiled languages like C and C++ are translated into machine code through a compiler, which makes them run very quickly and gives them full access to system resources (CompTIA, 2022, 10.1.3). Interpreted languages, such as Python and JavaScript, are slower but portable across multiple platforms and easier to debug (CompTIA, 2022, 10.1.3). Assembly language, on the other hand, is a low-level language that interacts directly with hardware and provides efficiency, though it is difficult to write (CompTIA, 2022, 10.1.5). Query languages, such as SQL, are specialized for working with databases and turning raw data into meaningful information (CompTIA, 2022, 10.1.6). Compared to all of these, Scratch hides much of the complexity behind colorful blocks and focuses more on logical flow than on syntax. Out of the languages I reviewed, interpreted languages seemed the easiest to use. They do not require as much setup as compiled languages, and they give immediate feedback when errors appear. That kind of instant response feels closer to the trial-and-error style of Scratch. Effectiveness of Different Languages Each programming language type has its place: Compiled languages are most effective for large, performance-heavy applications like video games or enterprise software. Interpreted languages are useful for quick development, learning, or building applications that need flexibility, such as web apps or automation scripts. Assembly language is best when precise hardware control is needed, like in embedded systems or device programming. Query languages are effective in database management, helping to quickly pull, organize, and analyze data. Scratch and block-based languages work best for education and learning the logic of programming without worrying about syntax errors. The Most Popular Programming Language Among all the languages studied, Python currently stands out as the most popular programming language worldwide. According to the 2023 TIOBE Index, Python has consistently ranked first because of its simplicity, readability, and broad applicability across fields such as data science, web development, automation, and artificial intelligence (TIOBE, 2023). Its ease of learning and large supportive community make Python especially valuable for both beginners and professionals. Compared to other languages, Python balances accessibility with powerful functionality, which explains its widespread adoption. Scratch Project Link https://scratch.mit.edu/projects/1212472890 References CompTIA. (2022). Tech+ CertMaster Learn FC0-U71. Wiley. Resnick, M., Maloney, J., Monroy-Hernández, A., Rusk, N., Eastmond, E., Brennan, K., Kafai, Y., ... Silverman, B. (2009). Scratch: Programming for all. Communications of the ACM, 52(11), 60–67. https://doi.org/10.1145/1592761.1592779 TIOBE. (2023). TIOBE index for Python. TIOBE Software. https://www.tiobe.com/tiobe-index/

Productivity in Action: How Everyday Apps Shape My Workflow

Introduction In modern academic and professional environments, application software plays a central role in how individuals create, analyze, and share information. Word processors, spreadsheets, presentation programs, and databases each offer unique functions designed to meet different needs. Although these applications share some similarities in design and user experience, they differ in interface, purpose, and complexity. This paper compares the functions, advantages, and disadvantages of each type of software, identifies the most appropriate application for documenting daily activities, and illustrates additional scenarios where each program proves useful. Ultimately, while all applications are valuable, word processing software emerged as the most effective for recording my personal daily information. Functions of Application Software Each application type supports distinct tasks but also overlaps in workflow features. Word processors, such as Microsoft Word, are designed for creating and editing text-based documents. They offer formatting tools, spell check, and organization features such as multilevel bullet lists that allow users to present information clearly (Gaskin, Vargas, & Geoghan, 2021). Spreadsheets, such as Microsoft Excel, differ by using a grid of rows and columns for numerical data, calculations, and data visualization. While text formatting is possible, Excel’s primary strength lies in formulas and functions that support analysis. Presentation software, such as Microsoft PowerPoint, is used to display information visually through slides that integrate text, images, and multimedia. Finally, database applications, such as Microsoft Access, store and organize large collections of structured data and allow users to search and query information efficiently. Despite their differences, these applications share common editing tools, such as toolbars, formatting options, and file management features. However, the unique design of each program influences how information is processed and communicated. Excel, for example, felt the most challenging to use because of its technical row-and-column layout, while Word and PowerPoint provided more familiar text-editing experiences. Advantages and Disadvantages Each application presents strengths as well as limitations. Word processors are advantageous because they are approachable and intuitive; users can begin writing quickly and formatting tools are consistent across desktop and mobile platforms. Their disadvantage lies in limited capacity for numerical or statistical analysis. Spreadsheets are powerful for organizing, calculating, and analyzing data. They are particularly effective for creating percentages, budgets, and charts. However, spreadsheets can feel intimidating for new users, and the technical setup requires patience and accuracy (Davis, 2022). Presentation software excels at engaging audiences by combining visuals and spoken communication. It allows users to structure information into key points and illustrate concepts with images or graphs. At the same time, PowerPoint can be less efficient due to lagging functions and design requirements, which may slow the editing process. Database software is highly efficient for handling large datasets and supports advanced functions such as queries, reports, and multi-user access. However, it requires more technical expertise and is less intuitive than spreadsheets or word processors for new learners. Documenting Daily Information with Word and Excel For documenting my daily activities, Microsoft Word was the most effective application. Word allowed me to create a multilevel bullet list that organized tasks by time and provided subcategories for details. This format was efficient and clear, making it easy to capture a structured account of my day. To extend this documentation, I transferred my daily activities into Excel to analyze time usage. The table below represents ten tasks I engaged in during one day, with calculated hours: Task Hours Spent Sleep 7 Work (office tasks) 4 Classwork/Study 3 Family time 3 Meals (prep + eating) 2 Commuting 2 Exercise 1.5 Personal reading 1 Household chores 1 Entertainment/Relaxation 0.5 I then sorted the tasks by hours from highest to lowest, which highlighted that sleep, work, and study consumed the majority of my day. Finally, I created a pie chart in Excel to visually display this breakdown. The chart showed that nearly one-third of my time went to sleep, another third to work and study combined, and the remaining third split between personal, family, and leisure activities. This visual reinforced how my day balanced productivity with personal life. While Excel required more setup than Word, the ability to calculate totals and percentages made the analysis more insightful. This exercise demonstrated how Word and Excel can complement each other when documenting and analyzing daily routines. Additional Scenarios for Each Application Each application type is also valuable beyond documenting daily activities. Word processors are ideal for professional writing tasks such as resumes, reports, or academic essays. Spreadsheets are effective for managing budgets, tracking project milestones, or analyzing survey results. Presentation software is particularly useful in educational or business contexts where complex information must be delivered to an audience in an engaging format, such as during training sessions or sales pitches. Databases provide indispensable support in scenarios such as customer relationship management or inventory tracking, where large amounts of structured information need to be stored, organized, and retrieved efficiently. Conclusion Word processors, spreadsheets, presentation programs, and databases all provide essential tools for managing information in different ways. Word processors excel in text-based communication, spreadsheets in numerical analysis, presentations in audience engagement, and databases in large-scale data management. Each has distinct advantages and disadvantages that make them more or less suitable depending on the task. For documenting my personal daily activities, Microsoft Word proved to be the most appropriate due to its ease of use and organizational tools. However, combining Word with Excel allowed for deeper analysis of time management, showing the power of integrating multiple applications. Mastering these tools not only supports academic success but also prepares individuals for professional contexts where adaptability across software platforms is a critical skill. References Davis, G. (2022). The role of productivity software in higher education. Journal of Applied Learning Technology, 12(3), 45–52. Gaskin, S., Vargas, C., & Geoghan, D. (2021). GO! All in One: Computer Concepts and Applications. Pearson. Zhang, Y., & Zhang, S. (2021). The effectiveness of productivity software in improving learning outcomes. Journal of Educational Technology Development and Exchange, 14(1), 1–14. https://doi.org/10.18785/jetde.1401.01

My Blog List

Featured Post

Locking the Gates: Defending Against Ransomware and Phishing

Introduction Information security is essential for both individuals and organizations because modern life depends on connected systems that...