Cloud Computing: Benefits, Risks, and Deployment Models

Cyber-Security-(2)

20 Minutes

Computer networks are more advanced today than ever. More and more users are demanding greater access to these systems and as a result administrators are tasked with the dilemma of securing these highly complex networks. Many systems at one time had the luxury of relying on basic firewall implementations, which consisted of IP filtering and port blocking. In todays society this is no longer an option.

As today’s computer network systems advance, so do the intruder’s methods who wish to wreak havoc upon them. One such advancement in network security is the implementation of an IDS/IPS (Intrusion Detection System/Intrusion Prevention system). An IDS/IPS is a great addition to any unified threat management system, which can help thwart off an attacker’s advance or slow them down long enough to initiate alternative security measures. This paper will also explore the costs savings of outsourcing computing resources in conjunction with the security benefits and/or security vulnerabilities associated with doing so.

Continue reading

Exploring SHA-1 and MD5 Hashing Algorithms for Text Document Encryption

AES 256.png

6 Minutes

We will be taken through the two equivalent hashing processes that simulate a secured text document transmission, one using the SHA-1 hashing algorithm and another using the MD5 hashing algorithm. Hashes are cryptographic algorithms that manipulate data and produce fixed-length digests regardless of the amount of data used to create them. Despite small minor changes of the input data, hashing algorithm’s outputs changes significantly, which is an indication of the complexity of the algorithms mathematical computational formulas.

This paper will study the outputs of encrypted and decrypted text documents against the two various hashing algorithms SHA-1 and MD5. A password will be created during the encryption phase, which essentially functions as a secured key used to unlock the file for the intended recipient. The quality and usefulness of the SHA-1 and MD5 algorithms are widely debated and both arguments will be discussed here.

Continue reading

USS Saratoga Tragedy: A Sailor’s Fateful Night in the Red Sea


5 Minutes

This is a true story of my time serving aboard the Super Sara.

A Chilling Night in the Red Sea

The evening of December 22nd, 1990, seemed like just another night aboard the USS Saratoga. The colossal aircraft carrier had anchored off the coast of Haifa, Israel earlier that day. The air was filled with anticipation and relief as many of my fellow sailors eagerly disembarked for some much-needed shore leave, yearning for a taste of freedom after the relentless demands of flight operations over the past several nights. The vibrant promise of Haifa’s streets called to them, but exhaustion weighed heavier on my shoulders, and I chose the solace of sleep over the allure of the city.

Little did I know that my decision to remain on the ship would become a pivotal moment in my life, marking the night with an indelible memory of tragedy.

Continue reading

The Spine of “Shawshank Redemption” by, Miguel Bigueur

shawshank1_2772806b

Inciting incident: The conviction of Andy Dufresne for the murder of his wife and her secret lover.

Central Question: Will Andy succeed in escaping from prison?

Plant: Rita Hayworth, Marilyn Monroe, Raquel Welch.

Payoff: Hole in the wall leading to the underground tunnels.

  Continue reading

The Spine of “The Full Monty – 1997”

full-monty

The inciting incident: Two unemployed steel workers Gaz and Dave decide to form an all men dance ensemble to try to make some cash after visiting an all woman’s male strip club. Gaz sees this an opportunity to be worthy of his sons admiration.

PLOT POINT 1: After being confronted by Gerald for ruining his seemingly last chance at landing a good job, Gaz and Dave decide to recruit Gerald and other out work men to become a part of their ensemble.  They begin tryouts. Continue reading

The Spine of “Dog Day Afternoon – 1975”

dog day1

The inciting incident: Sonny and Sal pull out their guns and hold up a bank with only $1,100.

PLOT POINT 1: “Attica”, “Attica”, Sonny yells to the crowds winning over their sympathy. The hostages also see the human side of Sonny and Sal and also begin to start sympathizing with their situation and botched attempt of a routine robbery. Every time Sonny emerges from the bank, he is cheered by the sympathizing crowds. Continue reading

The Spine of “Donnie Brasco – 1997”

donniebrasco2

Genre: Crime Drama

I think it’s hard to spine this film because it doesn’t follow the typical structure. Since it’s based on actual events, I believe Paul Attanasio chose to stay as true to the original book as written by Joseph Pistone and Richard Woodley.

The hero’s journey?

Joespeh Pistone was a man who was determined to bring down a crime lord. He was so determined, he struggled with keeping his life together while saving the life of another. Donnie had engaged in small crimes in the beginning to win over the trust of the mob. Continue reading