{"id":246,"date":"2021-07-12T14:34:29","date_gmt":"2021-07-12T13:34:29","guid":{"rendered":"https:\/\/cyberphil.azurewebsites.net\/?p=246"},"modified":"2021-07-12T14:53:37","modified_gmt":"2021-07-12T13:53:37","slug":"transferable-skills","status":"publish","type":"post","link":"https:\/\/www.cyberphil.co.uk\/?p=246","title":{"rendered":"Transferable Skills"},"content":{"rendered":"\n<p>Recently on LinkedIn there was an interesting post from a chap who was looking to help a young friend who was not doing well at school but was gifted with computers and wanted to get into the world of hacking and all things cyber-security.&nbsp;<\/p>\n\n\n\n<p>He was looking to drop out of school to concentrate on IT and computers.<\/p>\n\n\n\n<p>Although some very good responses came back in support and all of them had the best interests of the young person at heart \u2013 it made me stop to reflect that despite the fact that we are all good at some speciality subject \u2013 how important having a wide base of general knowledge also is and the fundamentals of this comes from the width of a school curriculum.<\/p>\n\n\n\n<p>And even though you could excel in the world of hacking (hopefully ethical) and cyber security or whatever your specialism is \u2013 the core subjects that you learn at school, college or university will help and support you further.\u00a0 And it&#8217;s amazing how stuff you learned at school that you never thought would be useful \u2013 comes back to help at some point.<\/p>\n\n\n\n<p>In the military this type of training was often called \u2018transferable skills\u2019<\/p>\n\n\n\n<p>If you are an apprentice \u2013 you must hold functional skills in English and Maths.&nbsp; If for no other reason than the fact that you should be able to read, write and do calculations to a fundamental level.&nbsp; These skills will stay with you throughout life and I totally appreciate the fact that for some, these core skills don\u2019t come easily and some people don\u2019t thrive in a school classroom but do well in other environments.<\/p>\n\n\n\n<p>But having a broad general knowledge outside of the world of computers also means that you are a person with people skills.&nbsp; As an ice-breaker on my apprenticeship classes \u2013 I give a list of things I want to know about my new delegates.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Name<\/li><li>Company<\/li><li>Position within the company<\/li><li>Previous qualifications\/courses<\/li><li>\u2018Something you do outside of work that doesn\u2019t involve a screen\u2019 <em>or<\/em> \u2018something you have done that you are proud of\u2019<\/li><\/ul>\n\n\n\n<p>The final 2 options generally cause panic.<\/p>\n\n\n\n<p>Having a range of interests and general knowledge also helps to you communicate, create reports and explain things.<\/p>\n\n\n\n<p>Check this out:<\/p>\n\n\n\n<p>In the world of cyber security \u2013 one area which we generally cover is the concept of \u2018malware\u2019.<\/p>\n\n\n\n<p>Simply put, \u2018malware\u2019 is malicious software which you don\u2019t want on your system.&nbsp; The malicious range of malware and impact varies on the type of software and system it effects and this concept can be difficult to comprehend.<\/p>\n\n\n\n<p>We generally get it down into 3 categories:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Virus<\/li><li>Worm<\/li><li>Trojan Horse<\/li><\/ul>\n\n\n\n<p>What\u2019s the difference between the 3 of these?<\/p>\n\n\n\n<p>We have all heard the terms before and some will know the answer.&nbsp; Others will be able to give a textbook definition of the answer (which is good enough for the test) but don\u2019t really understand the difference.&nbsp; And so this is when an understanding of the terminology goes beyond the words in a book.<\/p>\n\n\n\n<p>General knowledge helps.<\/p>\n\n\n\n<p>Starting with a <strong>Trojan Horse<\/strong> \u2013 which is probably the easiest to understand.<\/p>\n\n\n\n<p>Films, books and poems all depict the great myth and ruse by the Greeks, who after putting the city of Troy to siege for 10 years feigned surrender and retreated, leaving a huge wooden horse outside of the gates of the city as a gift to the Trojans for their splendid victory.&nbsp; You might know the story.<\/p>\n\n\n\n<p>Once the Trojans were satisfied that the Greek army had scarpered they willingly opened up the gates and pulled the horse inside.&nbsp; Unfortunately for them that also allowed in a band of Greek elite soldiers who were hidden inside the horse and were able, under cover of darkness, to open up the defences of the city to the returning Greek forces.<\/p>\n\n\n\n<p>A Trojan or Trojan Horse is not a virus but a destructive program which looks like a genuine application.<\/p>\n\n\n\n<p>Once allowed in (by clicking on a link or downloading the file willingly) it is able to release its payload which either takes control of your system or opens up a backdoor to allow for other malware to come in.<\/p>\n\n\n\n<p>The rest is history (but unfortunately not mythical).<\/p>\n\n\n\n<p>Covid-19 is a <strong>virus<\/strong>.&nbsp; You might have heard of it.<\/p>\n\n\n\n<p>Covid-19 is malicious and spreads by being attached to water droplets (coughs, sneezes and bodily fluids) and other particles.&nbsp; It can be easily transmitted from one system to another \u2013 especially when there are no protective barriers in place and once inside a system is able to spread quickly.&nbsp; It is particularly nasty in older and vulnerable systems which may already have some kind of infection or have a weak immune system and those that don\u2019t bother to protect themselves and immunise against it.&nbsp; Its impact on the system will depend on the system \u2013 it might be very minor or it may be catastrophic.<\/p>\n\n\n\n<p>Defences include isolation, separation (social distancing), masks, screens, tests and jabs and also \u2026\u2026 knowledge and awareness.<\/p>\n\n\n\n<p>A computer Virus works in EXACTLY the same way.&nbsp; It needs a \u2018host\u2019 to attach to (a file) in order to infect and spread from system to system but once inside it will find out vulnerabilities.&nbsp; Those systems which are well maintained and patched will have a good defence against it and those that also have anti-virus software running will have the most up to date protection against it.&nbsp;<\/p>\n\n\n\n<p>But like all viruses \u2013 new variants continue to evolve and you need to maintain your system protection to keep up with these evolutions.\u00a0 However, you can never be 100% protected \u2013 but that doesn\u2019t mean you shouldn\u2019t try.<\/p>\n\n\n\n<p>The problem with social distancing and lockdowns is that they are no fun.  So if you want to roam around in the outside world &#8211; you either need to be protected or accept the risk.<\/p>\n\n\n\n<p>So what about a <strong>worm<\/strong>?<\/p>\n\n\n\n<p>If you are lucky enough to have a garden \u2013 try this out.<\/p>\n\n\n\n<p>Go to you local garden centre and buy a flower pot, bag of compost (peat free of course) and a nice flower or plant of your choosing.<\/p>\n\n\n\n<p>Pot up the plant \u2013 in the new pot with the nice clean compost.&nbsp; Water it in and place it on your lawn, patio or border to suit your needs.&nbsp; Keep it fed and watered for a couple of weeks and bask in the glory of your Monty Don skills.<\/p>\n\n\n\n<p>After a couple of weeks \u2013 carefully remove the flower\/plant and try not to damage the roots and have a rummage around the compost.\u00a0 There is a very good percentage chance that you will find an earthworm in it.\u00a0 Especially if you left it on the lawn or in the borders.\u00a0 If you live in a high rise block of flats, 25 stories up \u2013 perhaps less chance (but you never know!).<\/p>\n\n\n\n<p>So how did the worm get there?&nbsp;<\/p>\n\n\n\n<p>Well first of all \u2013 under its own steam.&nbsp; It crawled in itself (unless it was dropped by a bird) or you inadvertently mixed in other soil which had a worm in it.<\/p>\n\n\n\n<p>It either crawled up the side of the pot or (more probably) came in through the hole in the bottom of the pot which allows for the water to drain out.  As that&#8217;s the easiest route in and out.<\/p>\n\n\n\n<p>Did you spot that hole in the pot when you bought it?&nbsp; Perhaps you had the forethought to put one in as it\u2019s a necessary feature for pot-plants (ask Monty).&nbsp;<\/p>\n\n\n\n<p>So this \u2018necessary evil\u2019 has let a worm into your flower-pot without your knowledge.&nbsp; The good news is of course that worms are good for the soil \u2013 so no plants were harmed in this experiment.&nbsp; (As long as you re-potted it after digging it up!)<\/p>\n\n\n\n<p>Another great experiment with worms is to get a wormery for the kids (big kids included).&nbsp; These sometimes come with a glass front so you can see the worms in action.<\/p>\n\n\n\n<p>Layer in different types of soil.&nbsp; Sand, soft compost, clay soils, stony soil etc.&nbsp; Pop in a couple of earthworms \u2013 don\u2019t forget to put some vegetation on the top layer for them to eat.<\/p>\n\n\n\n<p>After a couple of days the worms will have worked through the layers of soil to create patterns (it\u2019s like living art!) &#8211; but then take a closer look.<\/p>\n\n\n\n<p>Which soil types to they prefer to move through?&nbsp; What happens when they come to an obstacle (rock, hard clay etc).&nbsp; That\u2019s correct &#8211; they simply find the softer soil and go round it themselves.&nbsp; They also poke holes in the top to feed and invite in other worms!&nbsp; Worms are great.<\/p>\n\n\n\n<p>Computer Worms are not great and are a class of virus.&nbsp; However unlike a true virus \u2013 it doesn\u2019t need a host to spread from one system to another and it can move autonomously.&nbsp; Not only that &#8211; but they can seek out vulnerabilities quickly and also reproduce at an alarming rate if left unchecked.&nbsp; Unlike an earthworm which are generally good for a plant system \u2013 the computer variety are not so welcome.<\/p>\n\n\n\n<p>The hole in the flower pot was either unknown or put in deliberately to serve a purpose.&nbsp; Think about how many \u2018holes\u2019 or intrusion points your computer has \u2013 applications which are constantly communicating, web connections, file transport system \u2013 the list is endless.&nbsp; Some of these connections we know and understand as we put them in place by setting up Email or Web Browsers \u2013 others remain unknown and potentially un-detected.<\/p>\n\n\n\n<p>Occasionally it\u2019s a good idea to check what\u2019s installed and running and if you no longer need it \u2013 turn it off or delete it.&nbsp; Plug the holes in other words.<\/p>\n\n\n\n<p>Regardless of whether its Virus, Worm or Trojan \u2013 we need to protect our systems.&nbsp;<\/p>\n\n\n\n<p>System Updates, Maintenance, Anti-Virus, Firewalls, Intrusion Detection Systems, scanning and testing are all great technical controls for defence.<\/p>\n\n\n\n<p>But the best defence of all \u2026.. User Training and Awareness (Knowledge and transferable skills)<\/p>\n\n\n\n<p>I love computers.&nbsp; But in this post I have called on some classroom subjects:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<ul class=\"wp-block-list\"><li>Classical Greek Mythology<\/li><li>Literature<\/li><li>History<\/li><li>Science<\/li><li>Chemistry<\/li><li>Virology (New in 2020!)<\/li><li>Biology<\/li><li>Geology<\/li><li>Zoology<\/li><li>Horticulture (Rural Science in my day!)<\/li><li>Current Affairs (Social Science)<\/li><li>Media Studies (Wasn\u2019t invented in my day!)<\/li><\/ul>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<p>And Cyber Security (not taught at my old school \u2013 but I know a place that does this well!)<\/p>\n\n\n\n<p><a href=\"https:\/\/firebrand.training\/uk\/courses\/security\">https:\/\/firebrand.training\/uk\/courses\/security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently on LinkedIn there was an interesting post from a chap who was looking to help a young friend who was not doing well at school but was gifted with computers and wanted to get into the world of hacking &hellip; <\/p>\n","protected":false},"author":1,"featured_media":247,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorised","grid-sizer"],"_links":{"self":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=246"}],"version-history":[{"count":3,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/246\/revisions"}],"predecessor-version":[{"id":251,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/246\/revisions\/251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/media\/247"}],"wp:attachment":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}