03 2015 NIST CyberSecurity Reference Model v01r01 draft

03 2015 Introduction to Threat Modeling [link]

EFF: An Introduction to Threat Modeling

Coming up with a set of possible attacks you plan to protect against is called threat modeling. Once you have a threat model, you can conduct a risk analysis...

Val-D'Or Quebec Canada

La Vallee de l'Or
* Note: bold indicates confirmed traffic.
Note: # = voice conversations were in French.

162.475 - NOAA Weather (English and French)

167.01000 BM tone 141.3 PL FM Law Dispatch
166.650 - # BM 146.2 PL FM Law Dispatch
167.02500 BM 146.2 PL FM Law Dispatch
167.34000 BM 146.2 PL FM Law Dispatch
167.70000 BM 146.2 PL FM Law Dispatch
166.83000 BM 141.3 PL Auxiliaire (Senneterre)


2015 DPD (data privacy day)

So... for us IT geeks, today is DPD (data privacy day), and thinking about this in terms of our kids... here are some tips for us to live by, and then pass on to our kids who are going to be way more socially connected than we are...

Once posted, always posted: Think twice about posting comments, images or videos that you wouldn’t want your employer to see. Share, but don’t over-share!

Home and Small Office Security - Raspberry Pi DHCP Server (OpenDNS)

Notes for creating a Raspberry Pi DHCP server to serve OpenDNS IPs to your local network for security purposes.

Why? Cost and Security!
1. The Raspberry Pi is a small compute module that costs less than $50 USD.
2. OpenDNS is a secure DNS service.

It's an inexpensive way to add an extra layer of security to your small office or home network.

If you are in need of a security audit for home or small office give me a call 309-340-2256.

IT Architecture Constructs, Models, and Principles

Notes on 5 major constructs of enterprise architecture, the relationship between business models and IT architecture models, and IT architecture principles.

Domain Architect:

... people skilled in technology infrastructure who have knowledge of industry trends and direction within their particular domain of expertise.

Architecture Blue Print:

... a set of documents that identify how technology and I/T strategy plans will affect the five major constructs of enterprise architecture.

St. Louis MO

* BOLD = confirmed operation

162.550 NOAA Weather
146.94000 R.A.C.E.S./SKYWARN Weather
146.91000 St. Louis County Skywarn - Wx net VHF
155.86500 ESDA / Weather Watchers

Timmins Ontario Canada

* bold = confirmed traffic:

- 142.305 Fleetnet
- 142.530 Fleetnet * heard road condition traffic

148.0600 150.8900

- 152.270 SENATOR APTS.

- 167.910

04.01 amateur radio emergency frequencies

Here is a list of amateur radio emergency frequencies that you should keep in mind when both looking for radios and coming up with your emergency communications plan:

34.90: Used nationwide by the National Guard during emergencies.
39.46: Used for inter-department emergency communications by local and state police forces.
47.42: Used across the United States by the Red Cross for relief operations.
52.525: Calling frequency used by ham radio operators in FM on their six-meter band.

ITIL: Enterprise Solutions Architecture

Some general thoughts on how an ITIL/ITSM process framework can help an Enterprise.

I'm thinking of this in terms of an enterprise that delivers a solution. This can be a global IT department delivering IT solutions to the enterprise, or a technology company delivering solutions to customers. This is an hybrid thought of ITIL and IT Architecture.


Subscribe to CyberMick's Blog RSS