Cyber Sec
Cyber Sec
1. Confidentiality: Ensuring that information is accessible only to those authorized to have access.
2. Integrity: Safeguarding the accuracy and completeness of information and processing methods.
3. Availability: Ensuring that authorized users have access to information and associated assets when
required.
4. Authentication: Verifying the identity of a user, device, or other entity in a computer system, often
as a prerequisite to allowing access to resources in that system.
5. Non-repudiation: Ensuring that the authenticity of a signature or an assertion can be verified by
both parties in a transaction.
6. Access Control: Limiting access to information resources only to those who are authorized.
cybersecurity concepts:
1. Threats: Anything that can exploit a vulnerability to breach security and cause harm to an asset.
2. Vulnerabilities: Weaknesses or gaps in security that can be exploited by threats to gain unauthorized
access to an asset.
3. Risk: The potential for loss or damage when a threat exploits a vulnerability.
4. Encryption: The process of converting information or data into a code to prevent unauthorized
access.
5. Firewalls: Systems designed to prevent unauthorized access to or from a private network.
6. Intrusion Detection Systems (IDS): Devices or software applications that monitor network or
system activities for malicious activities or policy violations.
7. Malware: Malicious software designed to disrupt, damage, or gain unauthorized access to computer
systems.
8. Phishing: A method of trying to gather personal information using deceptive e-mails and websites.
Firewall
What is a Firewall?
A firewall is a network security device or software that monitors and controls incoming and outgoing
network traffic based on predetermined security rules. Its primary purpose is to establish a barrier between a
trusted internal network and untrusted external networks, such as the Internet.
Types of Firewalls
1. Packet-Filtering Firewalls:
o Inspect packets and allow or block them based on source and destination IP addresses, ports,
or protocols.
o Operate at the network layer.
o Example: Stateless firewalls.
2. Stateful Inspection Firewalls:
o Monitor the state of active connections and make decisions based on the context of the traffic.
o Keep track of the state of network connections (e.g., TCP streams).
o Example: Dynamic packet-filtering firewalls.
3. Proxy Firewalls:
o Act as an intermediary between users and the Internet.
o Inspect application layer traffic and can block malicious content.
o Example: Application layer firewalls.
4. Next-Generation Firewalls (NGFW):
o Provide advanced features such as deep packet inspection, intrusion prevention, and
application awareness.
o Combine traditional firewall capabilities with additional security functions.
o Example: Palo Alto Networks, Fortinet.
5. Unified Threat Management (UTM) Firewalls:
o Integrate multiple security functions, including firewall, antivirus, and intrusion
detection/prevention, into a single device.
o Ideal for small to medium-sized businesses.
By Functionality
1. Packet-Filtering Firewalls:
o Inspect packets and allow or block them based on predefined rules related to IP addresses,
ports, and protocols.
o Operate at the network layer.
2. Stateful Inspection Firewalls:
o Monitor the state of active connections and make decisions based on the context of traffic.
o Operate at the transport layer and provide more security than packet-filtering firewalls.
3. Proxy Firewalls:
o Act as an intermediary between users and the Internet, inspecting and filtering traffic at the
application layer.
o Can block malicious content and provide more detailed monitoring.
4. Next-Generation Firewalls (NGFW):
o Incorporate traditional firewall functionality with advanced features such as deep packet
inspection, intrusion prevention, and application awareness.
o Provide comprehensive security by identifying and controlling applications and preventing
modern threats.
5. Unified Threat Management (UTM) Firewalls:
o Integrate multiple security features, including firewall, antivirus, intrusion
detection/prevention, and more, into a single device.
o Ideal for small to medium-sized businesses that need a comprehensive security solution.
By Architecture
1. Hardware Firewalls:
o Standalone devices dedicated to firewall functions.
o Suitable for protecting large networks and providing high performance.
2. Software Firewalls:
o Installed on individual devices such as computers or servers.
o Suitable for personal use or protecting individual machines within a network.
3. Virtual Firewalls:
o Deployed in virtual environments to protect virtual machines and cloud infrastructure.
o Provide the same functionality as hardware or software firewalls but in a virtualized form.
By Deployment
1. Network Firewalls:
o Placed at the boundary between an internal network and an external network.
o Protect the entire network by monitoring and controlling incoming and outgoing traffic.
2. Host-Based Firewalls:
o Installed on individual devices to protect them from attacks.
o Monitor and control traffic to and from the specific device.
3. Cloud Firewalls:
o Hosted in the cloud and provide security for cloud-based applications and services.
o Protect cloud infrastructure from various threats and can be managed remotely.
Key Functions of Firewalls
Importance of Firewalls
Protect Against Cyber Threats: Firewalls help block malicious traffic and prevent unauthorized
access to your network.
Enforce Security Policies: By defining and enforcing security rules, firewalls help maintain the
integrity and security of your network.
Detect and Respond to Threats: Advanced firewalls can identify and respond to suspicious
activities in real-time.
Enhance Network Performance: By filtering unwanted traffic, firewalls can improve overall
network performance.
1. Update Firmware Regularly: Ensure your firewall's firmware is up-to-date to protect against
known vulnerabilities and to benefit from the latest security features.
2. Change Default Settings: Default passwords and settings are well-known and can be easily
exploited. Change them immediately after installation.
3. Strong Authentication: Use strong, complex passwords and multi-factor authentication (MFA) for
accessing your firewall settings.
4. Disable Unused Services: Turn off any services or features that you do not use to minimize potential
attack surfaces.
5. Implement Access Controls: Limit who can access and modify firewall settings. Use role-based
access control (RBAC) to ensure only authorized personnel can make changes.
6. Educate Users: Train your staff on best security practices and the importance of firewall security. Encourage
them to report any suspicious activities.
1. Internal Zone:
o This zone includes trusted internal network resources, such as user workstations, internal
servers, and other network devices.
o Traffic within this zone is typically trusted, but security policies can still be applied to
monitor and control activity.
2. External Zone:
o This zone represents untrusted external networks, such as the Internet.
o Traffic from this zone is considered the highest risk and should be carefully monitored and
filtered.
3. DMZ (Demilitarized Zone):
o A special zone that acts as a buffer between the internal network and the external network.
o Typically hosts public-facing services such as web servers, mail servers, and DNS servers.
o Provides an additional layer of security by isolating these services from the internal network.
4. Perimeter Zone:
o An outermost layer of the network that serves as the first line of defense against external
threats.
o Often used to house security devices such as firewalls and intrusion detection/prevention
systems (IDS/IPS).
5. Guest Zone:
o A separate zone for guest users, typically providing limited access to the Internet and
minimal access to internal resources.
o Ensures that guest devices do not pose a risk to the internal network.
6. Management Zone:
o A dedicated zone for managing network devices and security appliances.
o Access to this zone should be restricted to authorized personnel only.
7. Wi-Fi Zone:
o A zone specifically for wireless network traffic.
o Can be further divided into secure and guest Wi-Fi zones, with different security policies
applied to each.
Firewall Protocals
Firewalls utilize various protocols to manage and control network traffic. Here are some commonly used
protocols in firewalls:
1. Ensuring Compatibility:
o Protocol testing verifies that different devices and software applications can communicate
effectively within a network.
o It ensures that various network components adhere to protocol standards, enabling seamless
interoperability.
2. Identifying Vulnerabilities:
o Testing protocols helps uncover potential security vulnerabilities and weaknesses that could
be exploited by attackers.
o It ensures that protocols are robust and can withstand malicious activities.
3. Enhancing Performance:
o Protocol testing evaluates the performance of protocols under various conditions, such as
high traffic loads and network congestion.
o It helps identify and resolve performance bottlenecks, ensuring efficient data transmission.
4. Compliance with Standards:
o Protocol testing ensures that network components comply with industry standards and
regulations.
o Compliance with standards such as ISO, IEEE, and others is essential for achieving
certification and maintaining credibility.
5. Ensuring Reliability:
o Testing protocols ensures the reliability and stability of network communications.
o It helps prevent communication failures and data loss, maintaining the integrity of network
operations.
6. Validating New Protocols:
o When new protocols are developed, rigorous testing is essential to validate their functionality
and security.
o It helps ensure that new protocols can be safely deployed in real-world environments.
SYSTEM IMPLIMENTATION
System implementation is a crucial phase in developing and deploying any new IT system. Here are the key
steps typically involved in this process:
1. Planning: This involves defining the scope, objectives, and deliverables of the system
implementation. It includes creating a detailed project plan, allocating resources, and setting a
timeline.
2. Requirements Analysis: Understanding and documenting the specific needs and requirements of the
system. This may involve consultations with stakeholders, end-users, and IT professionals.
3. System Design: Creating a blueprint for the system, including architecture, interfaces, data models,
and processes. It should address both functional and non-functional requirements.
4. Development: The actual coding and building of the system. This step involves writing and testing
code, integrating different components, and ensuring that the system meets the specified
requirements.
5. Testing: Thoroughly testing the system to identify and fix any bugs or issues. This can include unit
testing, integration testing, system testing, and user acceptance testing (UAT).
6. Deployment: Installing and configuring the system in the production environment. This may involve
data migration, setting up user accounts, and configuring network settings.
7. Training: Providing training to end-users and administrators on how to use and manage the system
effectively. This ensures that everyone is comfortable with the new system.
8. Support and Maintenance: After deployment, ongoing support and maintenance are necessary to
ensure the system continues to operate smoothly. This may include regular updates, bug fixes, and
addressing any user issues.
9. Evaluation and Review: Assessing the system's performance and effectiveness. Gathering feedback
from users and stakeholders to identify areas for improvement.
1. Data Protection – Ensures that critical data is not lost due to security incidents such as malware
attacks, accidental deletion, or system failures.
2. Ransomware Recovery – In case of a ransomware attack, backups allow data restoration without
paying the ransom, minimizing downtime and financial loss.
3. Disaster Recovery – Acts as a safeguard against cyber threats, hardware failures, or natural
disasters, ensuring quick system restoration.
4. Business Continuity – Reduces downtime by allowing organizations to recover from cyber incidents
without major disruptions to operations.
5. Version Control & Rollback – Provides the ability to revert to previous, secure versions of data or
system configurations if security breaches occur.
1. End-User Training
o Focuses on general users who interact with the system daily.
2. Administrator Training
o Designed for IT staff and system administrators responsible for managing the system.
4. Role-Based Training
o Tailored to different job roles to ensure users understand how the system applies to their tasks.
6. Self-Paced Training
o Users access online tutorials, manuals, or video guides at their own pace.
1. Ensure System Reliability – Regular maintenance helps prevent unexpected failures, ensuring
systems function efficiently.
2. Increase System Lifespan – Proper scheduling helps extend the life of hardware and software by
preventing premature wear and tear.
3. Prevent Costly Downtime – Scheduled maintenance reduces unexpected breakdowns, minimizing
operational disruptions and financial losses.
4. Enhance Security – Regular updates, patches, and security checks help protect systems from cyber
threats, malware, and vulnerabilities.
5. Optimize Performance – Maintenance ensures systems run smoothly by clearing outdated files,
fixing bugs, and optimizing configurations.
6. Compliance with Regulations – Helps organizations meet industry standards and legal
requirements for data protection and system integrity.
1. Enhanced Security – Updates patch vulnerabilities, protecting against new threats like malware,
ransomware, and hacking attempts.
2. Improved Threat Detection – Ensures the firewall can identify and block the latest cyber threats,
including zero-day attacks.
3. Bug Fixes – Resolves software glitches or performance issues that could weaken firewall
effectiveness.
4. Better Performance – Updates optimize firewall efficiency, reducing lag and improving network
speed.
5. Compliance with Security Standards – Helps organizations meet regulatory requirements (e.g.,
GDPR, HIPAA) by maintaining up-to-date security measures.
6. Protection Against Evolving Attack Methods – Cybercriminals constantly develop new hacking
techniques; updates help counteract them.
7.
CAREEROBJECTIVE
To widen my knowledge and attain capabilities which enables me to meet organizational objectives as well
as personal growth and development.
GOALS
➢ To build close relationship with colleagues, management and customers.
➢ To build professional skills in any activity allocated.
ACADEMIC QUALIFICATION
2000-2004: Bukhalalire Secondary School and awarded Kenya Certificate of
Secondary Education with a mean grade of C- (Minus)
WORK EXPERIENCE
Sep 2014 to Date :Artcaffee Coffee and Bakery as a Saucier Chef.
Dec 2006 – Feb 2007 : Worked in Cock Pit Restaurant as a Saucier Chef.
July 2005 – Oct 2006 :Worked as a General Worker in Casino Samsung Limited.
HOBBIES
• Reading
• Travelling
• Socializing
REFEREES
1. Chef Muloo : Kitchen Manager Artcaffee
Lavington Branch
Tel: 0720 918 245