Search results

  1. Trevor Chandler

    Three Pillars of Cybersecurity

    The three pillars of cybersecurity: 1) People 2) Processes 3) Technology These three elements/components do interconnect to form a strong security framework! Is this covered in any of the CompTIA cybersecurity related courses?
  2. Trevor Chandler

    Cybersecurity Terms

    This is too original to have come from any webpage, or any textbook. I'd like your permission to use this the next time I'm covering these terms!!!
  3. Trevor Chandler

    Top Cyber Attacks in 2024???

    Why do you suppose the bad actors pound so hard on academia??? Are they attempting only to disrupt, only to steal, or something else?
  4. Trevor Chandler

    Cybersecurity Terms

    Your comment is a fair one!
  5. Trevor Chandler

    Cybersecurity Terms

    Thanks for your response Mark. In your example, you say that the poor soul who clicks the link in the email is the attack target. In your definition of "Attack Surface", you say that this is the avenue of the attack. Based on your example, does that imply that the poor soul is an attack surface?
  6. Trevor Chandler

    Cybersecurity Terms

    Hello CINners, When I'm listening to presentations at cybersecurity events, there are some common terms that are used, such as: - vulnerability - threat - attack surface - attach vector Just to name a very few. Can you define these terms without having to launch your favorite search engine...
  7. Trevor Chandler

    Top Cyber Attacks in 2024???

    Being the respected member that you are of this community Mr. Butler, I do thank you for your input!!!
  8. Trevor Chandler

    Surface, Deep, and Dark Web

    Does this look like a good depiction of these three levels of the web?
  9. Trevor Chandler

    Dark Web Visit

    I haven't gone yet Ben. I want to make sure I have the necessary tool(s), and the proper directions. I don't want to leave Houston, with my destination being Los Angeles, and I'm headed down I-10 East - and after arriving in Jacksonville, wondering why I reached the dead-end of I-10, and...
  10. Trevor Chandler

    Use of VPN when using Windows

    Tess, do you use the VPN to connect from your home to your office because the device you use runs Windows?
  11. Trevor Chandler

    Top Cyber Attacks in 2024???

    This is terrific. Thanks Previous!!!!
  12. Trevor Chandler

    Use of VPN when using Windows

    Thanks Previous for your response!
  13. Trevor Chandler

    Use of VPN when using Windows

    Why am I NOT surprised that this is your response :-( :-( :-(
  14. Trevor Chandler

    Top Cyber Attacks in 2024???

    Hello Ryan, The phrasing of my question was not the best - my apologies! I intended to ask the "types" of cyber attacks that are the top 8. Thanks Ryan for helping me along!!!
  15. Trevor Chandler

    Use of VPN when using Windows

    Hello CINners, I can see why I'd want to use a VPN when I'm away from home. However, I ain't thinking about using a VPN when I am at home. Is there anyone in the community that uses a VPN, when on their home Internet connection - simply because the OS on the computer is Windows?
  16. Trevor Chandler

    CompTIA Restructure

    Have to agree with you 100% Gregory!!!
  17. Trevor Chandler

    Dark Web Visit

    Thank you Gregory! Very insightful comments!!!
  18. Trevor Chandler

    Top Cyber Attacks in 2024???

    Hello CINners, What would you say are the top 8 cyberattacks that have occurred in 2024 thus far? Of those top 8, which is #1?
  19. Trevor Chandler

    CompTIA Restructure

    I have to believe that if the leadership went forward with this move, that it has to be a good move, if not a great one, for CompTIA.
  20. Trevor Chandler

    Dark Web Visit

    I don't want to get dirty! I'm an adventurer - a modern day Sinbad the sailor! So, being one, with a child-like mind (i.e. having an insatiable curiosity), I've got to make the journey. If I don't return, you can at least feel comforted in knowing that you made a safer, alternative suggestion...