top of page
  • Writer's pictureCyberAcademy

Makiah Wilson

Makiah Wilson

1st day of cyber camp

Today is July 29, 2019 and today in Cyber Security camp we learned about software. Troubleshooting is a part of software. There are 6 steps to the troubleshooting theory which are identifying the problem, establishing the theory of probable cause, testing your theory, establishing a plan of action, verifying full system functionality, and document findings. Also, we learned about safety. Some safety materials are, ESD straps which are used to protect you from getting shocked or electrocuted and anti-static bags which are use to wrap in special wrap so you want be electromagnetically interfered with the computer insides like R.A.M. Some safety tips with working in the inside of a computer are disconnecting the power, removing all accessories, securing loose wires and or cables, make sure you wear an air filter and goggles since your dealing with chemicals and gases, and make sure if you are carrying something over a weight limitation you ask someone to help you carry it and make sure you bend your knees and lift with your legs. Types of installations are upgrades, multi-boost, repairing disks, clean installations, and image deployments. Last thing I learnt were features of Windows, Mac, and Linux installation features.

Today is the 2nd day of camp and we learnt about hardware. Hardware is the physical components of the computer like monitors, and the keyboard and more. The motherboard is the central piece, to most of the hardware components. Another important part of the motherboard is the B.I.O.S, which stands for Basic Input Output System. The BIOS runs, basically tells the moth the motherboard which is important. Also, we learned that the CMOS is removable and smallest component part that is in the motherboard. Another component we learned was the R.A.M which stands for Random Access Memory. RAM temporarily holds storage. There are 2 types of RAM’s, which are LGA’S and PGA’s, which stand for Land Grid Array and Pin Gray Array. Last we were taught that the motherboard has 2 bridges which are the North Bridge and the South Bridge. The North Bridge controls and manages the flow of traffic while the South Bridge controls the input and output.

Today is the 3rd day of cyber security camp and we learned about hacking. Hacking is very dangerous and can cause consequences in some ways. There are 3 different types of hackers which are Black hat hackers, White hat hackers, and Gray hat hackers. Black hat hackers are evil hackers who hack to find information of things and people. White hat hackers are the good hackers which do good hacking for good reasons and they have permission from all the sources they are going to hack. Gray hat hackers are hackers who try to hack for good reasons but don’t ask the places they are trying to hack for permission. Another thing we learned about was that white hackers (good guys) have teams red, blue, white, and purple so they can test information out. The red team play as the evil hackers, the blue team play as the defenders which are good, the white team are the administrator’s kind of like referees, and the purple are on both roles, red and blue so they tell them what did wrong and also try to work against them. So far this has been my favorite lesson.

Today is the 4th and last day before are graduation tomorrow. Today we have learned about security and social engineering. Security is what you protect yourself with. Like security cameras, and alarms. Social Engineering is what you do to gain information. We learned about 10 basic social engineering threats including, Phishing, Spear Phishing, Wailing, Vishing, Typasquatting or also known as URL Hijacking, Shoulder Surfing, Tail Gating, Spam, Piggy Back, and Dumpster Diving. We also learned about some security protection ways which include, never share passwords, learn to recognize suspicious behavior, log off computers, shred papers, mail, credit cards or anything that has information on it, and make sure you have security cameras and alarms that can catch intruders. Lastly, we played a cybersecurity game. I will miss this camp.

Recent Posts

See All

Zariah Cooper

Reflection Day 1 Today I learned Trouble Shooting Theory, Safety Rules, and Windows, Mac, and Linux Features and Tools. In Trouble Shooting Theory, there are steps that you need to follow if you run i

Warrick DeGroft

Computer software is pretty cool, and I’m glad I learned a lot of these things. I don’t think I’ll work in computer software ever, but the information I now have will be very useful. I learned that wi

Tobias Matthews

I learned a lot of stuff like about people who make computers. Also how computers work I was surprised how big a mother board is. Today was a fun day I thought I was going to be boarded but I was not.

bottom of page