NerdDual CyberSecurity

By HDJames

Harry Dwayne James

DJames617 is The Ne'er-Do-Well Nerd

Cybersecurity Professional, Network technology enthusiast, PC Repair Savant, Video Game Addict, Web Design Padawan

I use this site to learn. Welcome to my playground. I'm always open to tips on web design. I've been busy so teaching myself is going slowly.

The New Gold Rush
The word spread fast. There's gold on those screens. People across the world turned their computers and started the treacherous journey to the vast, digital expanse known as the Internet. Dangers lurked everywhere but users pressed on traveling down this new digital Oregon Trail in search of their fortunes.
A modern-day gold rush unfolded. Users, armed with devices and connectivity, traversed the virtual landscape to stake their claim: personal data, the currency of the cyber frontiers. In this electronic wilderness, cybersecurity became the armor, and digital vigilantes sought to protect their digital homesteads.
The year was 2023, and the allure of the digital gold rush captivated millions. Individuals, small businesses, and corporations alike descended upon the expansive world of interconnected networks. The users, much like prospectors of the past, set up virtual camps, establishing their online presence with websites, social media profiles, and digital transactions.
However, as the value of personal data skyrocketed, a new breed emerged—the claim jumpers of the digital age. These were the hackers, armed with vulnerabilities and exploits as their weapons. They lurked in the shadows, waiting to pounce on unsuspecting users and mine their valuable information.
The users, realizing the importance of protecting their digital claims, donned the armor of cybersecurity. Encryption became their shield, firewalls their fortress walls, and multi-factor authentication their gatekeepers. The digital prospectors formed alliances with cybersecurity experts, forging a community of defenders determined to safeguard their valuable assets.
As the digital gold rush intensified, so did the attacks. Hackers, employing sophisticated tactics, sought to breach the defenses of the users and plunder their digital treasures. Phishing expeditions, malware ambushes, and ransomware raids became the weapons of choice for the nefarious claim jumpers.
Enter the Incident Responders—the Marshalls of the digital frontier. These cyber lawmen patrolled the vast expanses of the Internet, responding to distress signals and bringing justice to those who fell victim to the onslaught of hackers. Armed with forensic tools, threat intelligence, and a keen understanding of the virtual landscape, the Incident Responders worked tirelessly to thwart the attacks and apprehend the digital outlaws.
The battle between users and hackers raged on, reminiscent of the clashes between prospectors and claim jumpers during the historic gold rush. The digital frontier, like the Wild West of old, became a place of both opportunity and peril.
In this evolving saga, the users, equipped with their cybersecurity arsenal, stood resilient. They understood that in the digital gold rush, protecting their claim wasn't just a choice but a necessity. The Marshalls continued their vigilant watch, ensuring that justice prevailed in the vast and often lawless expanse of the Internet.
And so, the digital gold rush continued, with users adapting and fortifying their defenses, while hackers sought new exploits and vulnerabilities to exploit. In this ongoing battle for control of the digital frontier, one thing remained clear—the stakes were high, and the clash between users and hackers was the defining narrative of the 21st-century gold rush.

Harry Dwayne James

I am DJames617 the Ne'er-Do_Well Nerd, but you can call me "ND". I am a Cybersecurity Analyst for a major publishing company. I love security. Security to me is knowing that everything is where it's supposed to be and if anyone moves it, I get alerted immediately. I like when things are in place, and it bothers me when things aren't. Security is something I've been familiar with my whole life because it's been absent for most of it. I grew up in Boston's underserved neighborhoods in the 1990's. If you didn't secure your assets, they would quickly become someone else's assets. Information you tried to keep confidential would often become public knowledge. Surviving that atmoshpere takes a special set of skills. I've acquired those skills and sharpended them to a knife's edge. Luckily for me, those skills transfer to the cybersecurity industry nicely.
Hood SkillCyberSkill Transfer
Lock upeverythingyou would like to keep safe. Failure to lock up your stuff is an invitation for someone to steal it.Use Encryption Everywhere
Friends Stealing from you is a hard fact of life where I come from. Make sure you watch your friend and watch your things.Place DLP measures wherever you can
Trust No One is the way of life. If your friend is the only one that know your information, he is the only one that could leak it. Watch for Insider Threats
Give out information that is strictly neccessary, NO MOREOperate by the principle of least privilege
Random damaging attacks and frequent robberies for items of any value are common occurrancesCyber adversaries
That information your friend leaked could get you kidnappedHave a Ransomware Recovery Plan


Just because something is locked doesn't mean it can't be stolen. Not locking it however makes getting it stolen an almost certainty.

I was always told that I was smart, and that would help me get out of those neighborhoods one day. My problem was I wanted my life to change then. I didn't want to wait for one day to come. I wanted the things the kids that weren't smart had. The kids that didn't even go to school had new sneakers, fresh clothes, money, all the things I didn't have. I was hell bent on getting them too.I made a fateful decision to stop going to school and started trying to make my dreams a reality. One of the factors in that fateful decision was the fact that I already had 2 daughters by the time I was 17. School didn't seem like the best option for me at the time, although I never lost my love for learning.
Trying to provide for 2 babies when you are still just a kid yourself is stressful beyond belief. It is not a fun ride. There are good times for sure, but the majority of the times were hard. I had to make hard decison everyday. I didn't have many options for making money. People just weren't into hiring uneducated teenagers for high paying jobs. Doing all this in an area where resources are already in short supply is like playing the game of life in survival mode.
That's what I did, I survived. I made some adjustments. I joined the rest of the Ne'er-Do-Wells that I had passed on my way to school. It was in that environment when people kept commenting on my intelligence I knew I had made some wrong moves, but the kids had to eat. What could I do but be a Ne'er-Do-Well Nerd and hope I can make life better for my kids.
I used to hear people say that the streetlife is the easy way out. Those people have never lived that life. I was constantly in conflict like a small boat in a hurricane. I had to adjust my sails and find calmer waters. I got my hands on an old WANG 386. It was broken so I had to learn how to fix it. When I did go to school I was always in the computer lab. I helped the teacher with repairs on some of the systems so I had a good idea of what to do to get it running.
When I finally got it to boot, it was like a sign from the universe. I got a job and left the hood behind. I've been working with and fixing computers ever since.
Today, I am a Cybersecurity Professional living in the Boston area. I am a recent graduate of Western Governor's University. I have a BSCSIA Bachelor of Science in Cybersecurity and Information Assurance along with 15 active IT certifications from organizations such as CompTIA, Amazon Web Services, Axelos, ISC2, and others.

I love to learn. I think that's why I enjoyed the WGU experience. I think WGU is great, but it is definitely not for everyone. One of the most attractive WGU offerings was the ability to do as many classes as I could. The more courses I finished in a term, the less the degree costs.

That structure allowed me to finish courses at a furious rate. I didn't finish the quickly because the content was easy, I finished them quickly because I was alredy familiar with the content. The hardest part for me was trying to figure out exactly how they wanted me to present the information. The industry certifications that I got as part of my degree were also challenging.

I have been in the IT feild for over 20 years. Some of the concepts were basic to me, but I do remember the first time I tried to ingest some of that stuff. It was hard. Only after using those concepts over and over again did it become familiar.

This is why WGU may not work for everyone. There was no traditional classes. If you need to learn something, you are going to struggle a bit more. I was able to apply my practical knowledge to the course material. If you don't have that experience, the time you spend learning could negate the ability to finish courses quickly. Most people aren't great at teaching themselves complex topics, that's why teachers exist.

The course instructors at WGU are there to guide, not to tell. They are industry professionals themselves and they want you to learn. They will put you on the right track, but do not expect them to directly answer your questions. They will more or less confirm that you are on the right track, but I found getting a concrete answer to "Is this right" to be quite challenging. People around me have noticed that I finished quickly and they want to do the same. When they ask me about WGU I tell them I think it's a good idea but don't do what I did. I try to steer them away from the program I completed.

But ND, Why would you do that?

Because the courses will be much harder for them than it would be for me. A family member just finised freshman year at a traditional school. We started at the same time. Before they go back to school for softmore year, I had finished. The inevitable conversation of "do you think I could do that?" came up. The answer is "Not really."

The answer was no because they wouldn't be able to apply the experience I can to offset some of the coursework. It took me 17 months, 1 week, and three days (give or take an hour or two) to finish 35 classes and earn my degree. I was able to apply the knowledge I've acquired over the last 20 years to test out of some classes completly.

WGU offers many different degree programs. If you have a ton of expeirience in a field and want a degree WGU may work for you. If you don't know anything about that field and you are starting from scratch, this may not be your best option. Your success in any of the program offerings is going to depend on your existing knowledge and your overall dedication to completing your program. I wish I had done it sooner but you know what the say; Wish in one hand ...

I'm an avid fan of technology, and entertainment of all kinds. I'm not so much a fan of people. I spend most of my time trying to understand things I currently don't; I prefer to ignore the people I don't understand.

I Don't Have To Worry About CyberSecurity

If I had a dollar for every time I've heard that, I'd have quite a few dollars and a little more patience. I just don't understand people that think this way.
CyberSecurity has taken a new role in our society. We all have to play a part to make sure we remain safe. There was once a time when securing digital information was only the concerns of IT professionals. Those days are gone and not likely to return. Now that we all walk around with computers in our bags, pockets, and on our wrist; we all have a need to keep our digital information safe.
Let's face it. The IPhone changed everything. The first 2 letters of that device says it all IP. The Internet Protocol is the primary protocol responsible for keeping everyone and everything connected. We went from using devices that let us communicate with each other to devices that keep us connected to one another.
That constant connection provides benefits that were just science fiction a few years ago to those of us that weren't born in the digital age.
It also presents a persistent threat.

We can find the location of loved ones almost instantly. We don't even need to contact them to find out where they are. You can look up the location of their phone using GPS. We watch any TV show we have subscription for in almost any location we have internet access. We can talk face to face even when we are thousands of miles apart using video conferencing. We find people we haven't seen in years with a simple search on Social Media and reconnect just as quickly with a simple message.
These benefits are truly an improvement on the way things were, but in our rush to use these new advantages a lot of people adopted technologies without fully understanding how being constantly connected presents a danger.
There was once a time when a threat actor needed to be reasonably close to you to cause you harm, unfortunately, those days are also gone. You can be robbed by someone sitting in a chair halfway around the world. You wouldn't know until it is too late. The damage is not limited to the cash in your pockets either. A digital theif can potentially steal everything you have, including your identity.
The Internet Protocol is a set of rules that devices use to communicate with each other. Communication is possible as long as both devices adhere to the rules. Because the rules are well known, they can be circumvented.

IP is very efficient at what it does. It establishes the connection and makes sure the message gets delivered. IP does not care if the person receiving the message is authorized to do so...
In many ways the IP protocol is like a postal worker. As long as the mail is delivered to the correct mailbox the job was done correctly. The postal worker is not responsible for making sure that the person retieving the mail from the mailbox is the person that is supposed to do so.
Since security is not inherently built into IP communication, it is up to us to change our mindset about how we communicate. Every piece of information coming to and from your device can be captured and read. The only thing a user can do to effectively limit this snooping is encrypt their transmissions.
The two most common types of encryption algorithms are symmetric and asymmetric.
Symmetric encryption, also known as a shared key or private key algorithm , uses the same key for encryption and decryption. Symmetric key ciphers are considered less expensive to produce and do not take as much computing power to encrypt and decrypt, meaning there is less of delay in decoding the data.
The drawback is that if an unauthorized person gets their hands on the key, they will be able to decrypt any messages and data sent between the parties. As such, the transfer of the shared key needs to be encrypted with a different cryptographic key, leading to a cycle of dependency.
Asymmetric encryption, also known as public-key cryptography, uses two separate keys to encrypt and decrypt data. One is a public key shared among all parties for encryption. Anyone with the public key can then send an encrypted message, but only the holders of the second, private key can decrypt the message.
Asymmetric encryption is considered more expensive to produce and takes more computing power to decrypt as the public encryption key is often large, between 1,024 and 2,048 bits. Asymmetric encryption is often not suited for large packets of data.
Unless you take the necessary precautions, any internet connected device is just waiting for something to connect to it. If this is an authorized user then great. If it is a threat actor, then bad things can happen. When you are asleep, your device is still up and connected. You know who else is still up and trying to connect? The bad guys, that's who.

Encryption plays a crucial role in personal cybersecurity by safeguarding sensitive information and communication from unauthorized access. It involves encoding data in a way that can only be deciphered by someone with the appropriate key or password. Here are some key roles that encryption plays in personal cybersecurity: