{"id":70,"date":"2026-01-25T18:11:12","date_gmt":"2026-01-25T18:11:12","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cargi001\/?page_id=70"},"modified":"2026-01-25T18:11:19","modified_gmt":"2026-01-25T18:11:19","slug":"system-security","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cargi001\/system-security\/","title":{"rendered":"System Security"},"content":{"rendered":"\n<p>System security coursework covered host-based security measures, malware analysis, and intrusion detection. This page documents my learning in protecting individual systems from compromise.<\/p>\n\n\n\n<p>Course Topics Covered<\/p>\n\n\n\n<p>Malware Classification: Viruses, worms, trojans, and ransomware<br>Intrusion Detection Systems: Signature-based and anomaly-based detection<br>Host-Based Security: File integrity monitoring (Tripwire)<br>Authentication Mechanisms: Password policies and multi-factor authentication<\/p>\n\n\n\n<p>Key Assignments<br>Malware Analysis<br>I studied how malware propagates and the differences between various malware types. Understanding that worms self-replicate while viruses require host programs, and how trojans masquerade as legitimate software, has informed my approach to system defense. Analysis of real-world malware incidents demonstrated the importance of layered security approaches.<br>Intrusion Detection<br>Coursework covered both signature-based detection, which identifies known attack patterns, and anomaly-based detection, which identifies deviations from normal behavior. I learned the advantages and limitations of each approach and how statistical profiling can detect novel attacks without prior knowledge of specific vulnerabilities.<\/p>\n\n\n\n<p>Reflection<br>System security requires vigilance at every level\u2014from password policies to malware defenses to intrusion detection. This coursework reinforced that security is not a product but a process requiring continuous monitoring and adaptation. The practical exercises with tools like Tripwire demonstrated how file integrity monitoring can detect unauthorized changes, while malware analysis taught me to think like an adversary to better defend systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>System security coursework covered host-based security measures, malware analysis, and intrusion detection. This page documents my learning in protecting individual systems from compromise. Course Topics Covered Malware Classification: Viruses, worms, trojans, and ransomwareIntrusion Detection Systems: Signature-based and anomaly-based detectionHost-Based Security:&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/cargi001\/system-security\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30381,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","wds_primary_avhec_catgroup":0},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages\/70"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/users\/30381"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages\/70\/revisions"}],"predecessor-version":[{"id":72,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages\/70\/revisions\/72"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/media?parent=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}