-
Notifications
You must be signed in to change notification settings - Fork 1
/
ns_module.html
276 lines (243 loc) · 14.5 KB
/
ns_module.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
<!DOCTYPE HTML>
<!--
Forty by HTML5 UP
html5up.net | @ajlkn
Free for personal and commercial use under the CCA 3.0 license (html5up.net/license)
-->
<html>
<head>
<title>Marianne Lyne Manaog</title>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no" />
<link rel="stylesheet" href="assets/css/main.css" />
<noscript><link rel="stylesheet" href="assets/css/noscript.css" /></noscript>
</head>
<body class="is-preload">
<!-- Wrapper -->
<div id="wrapper">
<!-- Header -->
<!-- Note: The "styleN" class below should match that of the banner element. -->
<header id="header" class="alt style2">
<a href="index.html" <span>Marianne Lyne Manaog</span></a>
<nav>
<a href="#menu">Menu</a>
</nav>
</header>
<!-- Menu -->
<nav id="menu">
<ul class="links">
<li><a href="index.html">Home</a></li>
<li><a href="oois_module.html">OOIS module</a></li>
<li><a href="oois_reflections.html">Reflections - OOIS</a></li>
<li><a href="ns_module.html">NS module</a></li>
<li><a href="ns_reflections.html">Reflections - NS</a></li>
<li><a href="ssdcs_module.html">SSDCS module</a></li>
<li><a href="ssdcs_reflections.html">Reflections - SSDCS</a></li>
<li><a href="sepm_module.html">SEPM module</a></li>
<li><a href="sepm_reflections.html">Reflections - SEPM</a></li>
<li><a href="rmpp_module.html">RMPP module</a></li>
<li><a href="rmpp_reflections.html">Reflections - RMPP</a></li>
</ul>
</nav>
<!-- Banner -->
<!-- Note: The "styleN" class below should match that of the header element. -->
<section id="banner" class="style2">
<div class="inner">
<span class="image">
<img src="images/pic07.jpg" alt="" />
</span>
<header class="major">
<h1>Network Security</h1>
</header>
<div class="content">
<p>Network security, including security management and <br />
protection issues and strategies.</p>
</div>
</div>
</section>
<!-- Main -->
<div id="main">
<!-- One -->
<section id="one">
<div class="inner">
<header class="major">
<h2>Lessons learnt and key outcomes</h2>
</header>
<p>By the units mentioned below, I learnt to understand the fundamentals of network security and critically plan and carry out vulnerability assessments and penetration testing, as well as learn from case studies to enhance the network security of web applications. By leveraging threat modelling frameworks, such as STRIDE and DREAD, I learnt to respectively identify security vulnerabilities and rank them based on their level of severity or impact. Furthermore, I learnt to appreciate the importance of understanding data privacy regulations, including GDPR and MDR for health-related data, and leveraged them to provide evidence-based informed recommendations to improve network security by ensuring the compliance to such directives when relevant.</p>
</div>
</section>
<!-- Two -->
<section id="two" class="spotlights">
<section>
<a class="image">
<img src="https://cdn.pixabay.com/photo/2017/09/22/18/11/cyber-security-2776600_960_720.jpg" alt="" data-position="top center" />
</a>
<div class="content">
<div class="inner">
<header class="major">
<h3>Unit 1: History of Network Security, Vulnerabilities and Approaches</h3>
</header>
<p>During this first unit, I had the chance to appreciate the history of network security, security vulnerabilities, approaches to scan systems and remediate such vulnerabilities. Moreover, I was asked to select a website to scan for security vulnerabilities (https://ehr-online.co.uk) and I was able to contribute to a collaborative discussion on the digitalisation and the security implications of the digital economy. Click ‘LEARN MORE’ below to view my post. </p>
<ul class="actions">
<li><a href=" https://github.com/marianne-manaog/ns-module-activities/blob/main/collaborative_discussions/Collab_discussion_unit_1.docx" target="_blank" rel="noopener noreferrer" class="button">Learn more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a class="image">
<img src="https://cdn.pixabay.com/photo/2017/05/17/14/03/ransomware-2320941_960_720.jpg" alt="" data-position="top center" />
</a>
<div class="content">
<div class="inner">
<header class="major">
<h3>Unit 2: Advanced Persistent Threats: Applying the Cyber Kill Chain Model</h3>
</header>
<p>In this unit, I had the chance to appreciate the importance of understanding and applying the Cyber Kill Chain model to identify security vulnerabilities and guiding businesses to stop cyber-attacks at each stage of the chain. I also provided the <a href=" https://github.com/marianne-manaog/ns-module-activities/blob/main/collaborative_discussions/First_peer_response_unit_2.docx">first</a> and the <a href="https://github.com/marianne-manaog/ns-module-activities/blob/main/collaborative_discussions/Second_peer_response_unit_2.docx">second</a> peer responses to a collaborative discussion as a continuation to the unit 1’s activity and performed a vulnerability analysis by leveraging the review of relevant and recent literature. Click ‘LEARN MORE’ below to read my analysis.</p>
<ul class="actions">
<li><a href="https://github.com/marianne-manaog/ns-module-activities/tree/main/vulnerability_analysis" class="button">Learn more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a class="image">
<img src="https://cdn.pixabay.com/photo/2020/05/21/05/28/security-5199236_960_720.jpg" alt="" data-position="25% 25%" />
</a>
<div class="content">
<div class="inner">
<header class="major">
<h3>Unit 3: Vulnerability Assessments</h3>
</header>
<p>Throughout this unit, I had the opportunity to reflect on the previous two units and lessons learnt and practised such security-related concepts to undertake <a href="https://github.com/marianne-manaog/ns-module-activities/tree/main/scanning_activity">this scanning activity</a>. Furthermore, I provided <a href="https://github.com/marianne-manaog/ns-module-activities/blob/main/collaborative_discussions/Summary_post_network_security_unit_3.docx">this summary post</a> to conclude the previous collaborative discussion, by blending the knowledge I gathered from my independent research and that learnt from my peers. I also carried out an assignment on a vulnerability audit and assessment, thus outlining a detailed baseline analysis and plan. Click ‘LEARN MORE’ below to read it.</p>
<ul class="actions">
<li><a href="https://github.com/marianne-manaog/ns-module-activities/blob/main/assignments/Vulnerability%20Audit%20and%20Assessment_assignment_1.docx" class="button">Learn more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a class="image">
<img src="https://cdn.pixabay.com/photo/2022/07/10/20/18/binary-7313703_960_720.jpg" alt="" data-position="top center" />
</a>
<div class="content">
<div class="inner">
<header class="major">
<h3>Unit 4: Breach Analysis and Mitigation</h3>
</header>
<p>During this unit, I had the chance to apply lessons learnt from previous units to conduct a breach analysis and outline recommendations to mitigate any identified breaches. Moreover, as per <a href="https://github.com/marianne-manaog/ns-module-activities/blob/main/collaborative_discussions/Initial_post_collab_discussion_2_network_security.docx">this post</a>, I participated in a collaborative discussion to describe the pros and cons of logging, analysing the impact of security vulnerabilities in open-source software, such as Log4j, and strategies to detect them proactively. I also took part in a scanning collaborative activity and my contribution can be accessed by clicking 'LEARN MORE' below.</p>
<ul class="actions">
<li><a href="https://github.com/marianne-manaog/ns-module-activities/blob/main/collaborative_discussions/Scanning%20and%20Collaborative%20Wiki%20Activity_unit_4.docx" target="_blank" rel="noopener noreferrer" class="button">Learn more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a class="image">
<img src="https://cdn.pixabay.com/photo/2018/01/17/20/22/analytics-3088958_960_720.jpg" alt="" data-position="top center" />
</a>
<div class="content">
<div class="inner">
<header class="major">
<h3>Unit 5: Logging, Forensics and Future Trends</h3>
</header>
<p>In this unit, I had the chance to ponder on the lessons learnt from the previous unit and learnt to appreciate logging, forensics, and their principles at a deeper level. Thus, I was able to provide <a href="https://github.com/marianne-manaog/ns-module-activities/blob/main/collaborative_discussions/Peer%20responses%20-%20Unit%205.docx">these peer responses</a> as a continuation of the previous unit’s collaborative discussion. Moreover, you can see my review of a security assessment reporting template, which summarises the key principles I learnt and applied, by clicking ‘LEARN MORE’ below.</p>
<ul class="actions">
<li><a href="https://github.com/marianne-manaog/ns-module-activities/blob/main/collaborative_discussions/Case%20study_unit_5.docx" class="button">Learn more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a class="image">
<img src="https://cdn.pixabay.com/photo/2020/02/03/20/49/technology-4816658_960_720.jpg" alt="" data-position="25% 25%" />
</a>
<div class="content">
<div class="inner">
<header class="major">
<h3>Unit 6: The Great Debate: The Future of the Internet</h3>
</header>
<p>Throughout this unit, I had the chance to cooperate with two peers to discuss the future of the Internet and, in particular, prepare and present <a href="https://github.com/marianne-manaog/ns-module-activities/blob/main/collaborative_discussions/Group_2_ppt_Final.pptx">this presentation</a> on peer-to-peer overlay networks and their advantages to improve the experience of passengers in autonomous vehicles. Furthermore, I produced the final assignment by performing a vulnerability audit and assessment, summarising my findings and providing them in the form of an executive summary. The final assignment can be accessed by clicking LEARN MORE below. I also wrote an individual reflective piece pondering on the lessons learnt from the entire NS module.</p>
<ul class="actions">
<li><a href="https://github.com/marianne-manaog/ns-module-activities/blob/main/assignments/Vulnerability%20Audit%20and%20Assessment_Results%20and%20Executive%20Summary.docx" class="button">Learn more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a class="image">
<img src="https://cdn.pixabay.com/photo/2017/08/06/12/06/people-2591874_960_720.jpg" alt="" data-position="top center" />
</a>
<div class="content">
<div class="inner">
<header class="major">
<h3>Reflections on the NS module, and own self-development</h3>
</header>
<p>In this reflective piece, I summarised what I learnt on Network Security in the NS module, the work I carried out throughout it, and their impact on my personal and professional development. Click ‘LEARN MORE’ below to read it.</p>
<ul class="actions">
<li><a href="ns_reflections.html" class="button">Learn more</a></li>
</ul>
</div>
</div>
</section>
</section>
</div>
<!-- Contact -->
<section id="contact">
<div class="inner">
<section>
<form method="post" action="#">
<div class="fields">
<div class="field half">
<label for="name">Name</label>
<input type="text" name="name" id="name" />
</div>
<div class="field half">
<label for="email">Email</label>
<input type="text" name="email" id="email" />
</div>
<div class="field">
<label for="message">Message</label>
<textarea name="message" id="message" rows="6"></textarea>
</div>
</div>
<ul class="actions">
<li><input type="submit" value="Send Message" class="primary" /></li>
<li><input type="reset" value="Clear" /></li>
</ul>
</form>
</section>
<section class="split">
<section>
<div class="contact-method">
<span class="icon solid alt fa-envelope"></span>
<h3>Email</h3>
<a href="#">marianne.manaog@ieee.org</a>
</div>
</section>
</section>
</div>
</section>
<!-- Footer -->
<footer id="footer">
<div class="inner">
<ul class="icons">
<li><a href="https://github.com/marianne-manaog" class="icon brands alt fa-github"><span class="label">GitHub</span></a></li>
<li><a href="https://www.linkedin.com/in/marianne-lyne-m/" class="icon brands alt fa-linkedin-in"><span class="label">LinkedIn</span></a></li>
</ul>
<ul class="copyright">
<li>© Marianne Lyne Manaog</li><li>Design: <a href="https://html5up.net">HTML5 UP</a></li>
</ul>
</div>
</footer>
</div>
<!-- Scripts -->
<script src="assets/js/jquery.min.js"></script>
<script src="assets/js/jquery.scrolly.min.js"></script>
<script src="assets/js/jquery.scrollex.min.js"></script>
<script src="assets/js/browser.min.js"></script>
<script src="assets/js/breakpoints.min.js"></script>
<script src="assets/js/util.js"></script>
<script src="assets/js/main.js"></script>
</body>
</html>