10 Class 05: Career Partner Power Hour Report - VascoLucas01/cybersecurity-reading-notes GitHub Wiki
Partner Power Hour - The 7 C’s of Cybersecurity & Coding
Share one or two ways the speaker’s information will change your approach to your career transition.
I really enjoyed the presentation. What a journey she has been through. The main point she referred to and I am going to keep in mind is conversion in a way that everyone has your skill set and doesn’t matter where you came from, because you will never start from the scratch.
In my opinion, the keys to achieve success are curiosity and consistency.
List a few key take-aways from this presentation.
First of all I would like to share some definitions that I considered very important and that were mentioned in this Partner Power Hour #1:
- Conversion. Translate your existing skill set. You are never starting from scratch.
- Courage. “People who become good leaders have a greater than average willingness to make bold moves, but they strengthen their chances of success - and avoid career suicide - through careful deliberation and preparation”
- Conversation. “The art of conversation lies in listening”; “Be brave enough to start a conversation that matters”
- Coordination. Developers aren’t the only ones responsible for a successful product launch; Security doesn’t exist in a vacuum; Security serves the business, and is a shared responsibility
- Consistency. Commit to addressing complexity, to tracking hard problems; Make a decision, and commit to seeing it through; Dedicate yourself to your goals
- Confession. It’s okay to say, “I don’t know”
- Cryptography.
The five primary functions of cryptography:
-
Authentication. The process of proving one’s identity
-
Integrity. Assuring the receiver that the received message has not been altered in any way from original
-
Key exchange. The method by which crypto keys are shared between sender and receiver
-
Non-repudiation. A mechanism to prove that the sender really sent this message
-
Privacy/confidentiality. Ensuring that no one can read the message except the intended receiver