Author Archives: admin

Automating Security

One of the most exploited security weaknesses that leads to data breaches is device misconfigurations, Some of these misconfigurations are:

  • Not changing the default passwords
  • Not cleaning up unused user accounts
  • Failing to remove unused / temporary access
  • Inability to cope with changes
  • Overly complex policies
  • Creating incorrect or non compliant policies
  • Changing wrong policies

Compared to security device flaws, misconfigurations can be mitigated by enforcing strict procedures as well as automation. Automating security configuration will eliminate human errors amidst the complex and rapidly changing environment.  For instance, Operating System images can be defined in a template format which have been hardened with the necessary configurations.  Orchestration tools such as Puppet, Ansible, or Chef are then used to deploy and implement automatically.  

How to Permanently Delete Data in the Cloud

In the pre-cloud era, to permanently delete data, the sectors on the physical disk must be overwritten multiple times with zeros and ones to make sure the data is unrecoverable. if the device will not be re-used, it must be degaussed. The Department of Defense standard, DoD 5220.22-M, goes so far as destroying the physical disk through melting, crushing, incineration or shredding to completely get rid of the data.

But these techniques do not work for data in the cloud. First, cloud customers probably will not have access to the provider’s data centers to access the physical disks. Second, cloud customers do not know where they are written, i.e. which specific sectors of the disk, or which physical disks for that matter. In addition, drives may reside on different arrays, located in multiple availability zones, or data might even be replicated in different regions.

The only way to permanently erase data in the cloud is via crypto-shredding. It works by deleting the encryption keys used to encrypt the data. Once the encryption keys are gone, the data cannot be recovered. So it is imperative that even before putting data in the cloud, they should be encrypted. Unencrypted data in the cloud will be impossible to permanently delete. As a cloud customer, it is also important that you own and manage the encryption keys and not the cloud provider.

Characteristics of a True Private Cloud

A lot of companies like to claim that their internal IT infrastructure is a “private cloud.”  But what really qualifies as a “cloud?”  According to ISC2 (International Information System Security Certification Consortium), ISO/IEC 17788, and NIST, a true private cloud must have the following characteristics similar to a public cloud such as AWS or Azure.

1. On-demand self-service.  This characteristic enables the provisioning of cloud resources including compute, storage and network whenever and wherever they are required.  It allows self-provisioning where the user can setup, manage or operate the cloud services without assistance from the cloud provider or IT personnel.

2. Broad network access. The cloud should always be available and accessible anytime and anywhere.  Users should have widespread access to their compute resources as well as their data at home, office, or on the road, using any device such as laptop, desktop, smartphone or tablet.

3. Resource pooling. A cloud typically has a large number of compute, storage, and network devices as well as sophisticated applications which can be pooled to address various user needs. These resources can be scaled and adjusted to meet user workloads or requirements.

4. Rapid elasticity.  This allows the user to obtain additional compute, storage, network and other resources as their workload requires.  This is often automated and transparent to the user.

5. Measured service.  This is a critical component for a cloud service because this is the only way the user can be charged back for its use of the resources.  A cloud should be able to measure, control, and report the user’s usage of resources. 

Most companies probably meet one or two of the above criteria.  Resource pooling for instance is one of them because of the widespread use of virtualization technology.  However, they usually struggle to provide measured service, as they usually over provision resources and unable to quantify usage. 

For the most part these companies are still traditional IT.   Without all of the cloud computing characteristics, it is simply not possible to deliver and maintain a reliable service to the rapid and changing requirements of the business.

Practical Research 2: Exploring Quantitative Research, 2nd Edition

About the book:
This book features the step-by-step process of quantitative research. It aims to develop critical thinking and problem-solving skills.

DepEd K-12 Curriculum Compliant
Outcomes Based Education (OBE) Designed
Grade Level: Grade 12 
Semester: 1st Semester
Track: Applied Track
Authors: Garcia M, Palencia J, Palencia M.
ISBN: 978-621-436-006-2
Edition: Second Edition
Year Published: 2019
Language: English
No. of pages: 368
Size: 7 x 10 inches

Contents:
CHAPTER 1 – Nature of Inquiry and Research
CHAPTER 2 – Identifying Inquiry and Formulating Statement of the Problem
CHAPTER 3 – Learning from Others and Reviewing the Literature
CHAPTER 4 – Understanding Data and Ways to Systematically Collect Data
CHAPTER 5 – Finding Answers through Data Collection
CHAPTER 6 – Reporting and Sharing Findings

CONTACT INFORMATION:

https://www.azespublishing.com

Bank Drive, Ortigas Center, 
Mandaluyong City, Philippines 1550 
Landline: +63 2 8515-9557 
Globe: +63 967-236-7338 
Smart: +63 961-362-2635 
sales@azespublishing.com 
azespublishingcorp@gmail.com 

Authorized Online Distributors

LAZADA 1

LAZADA 2

SHOPEE 1 

SHOPEE 3

CAROUSELL

Practical Research 1: Basics of Qualitative Research, 2nd Edition

About the book:
This book aims to develop critical thinking and problem-solving skills through qualitative research

DepEd K-12 Curriculum Compliant
Outcomes Based Education (OBE) Designed
Grade Level: Grade 11
Semester: 2nd Semester
Track: Applied Track
Authors: Garcia M, Palencia J, Palencia M.
ISBN: 978-621-436-007-9
Edition: Second Edition
Year Published: 2019
Language: English
No. of pages: 384
Size: 7 x 10 inches

Contents:
Chapter 1 – Nature of Inquiry and Research 
Chapter 2 – Qualitative Research and Its Importance in Daily Life
Chapter 3 – Identifying the Inquiry and Stating the Problem
Chapter 4 – Learning from Others and Reviewing the Literature
Chapter 5 – Understanding Data and Ways to Systematically Collect Data
Chapter 6 – Finding Answers Through Data Collection
Chapter 7 – Analyzing the Meaning of the Data and Drawing Conclusions
Chapter 8 – Reporting and Sharing the Findings

CONTACT INFORMATION:

https://www.azespublishing.com

Bank Drive, Ortigas Center, 
Mandaluyong City, Philippines 1550 
Landline: +63 2 8515-9557 
Globe: +63 967-236-7338 
Smart: +63 961-362-2635 
sales@azespublishing.com 
azespublishingcorp@gmail.com 

Authorized Online Distributors

LAZADA 1

LAZADA 2

SHOPEE 1 

SHOPEE 3

CAROUSELL

21st Century Literature from the Philippines and the World, 3rd Edition

About the book:

This textbook engages students in the appreciation and critical study of 21st Century Literature from the Philippines and the World encompassing their various dimensions, genres, elements, structures, contexts, and traditions.

Chapters 1 to 5 are literary texts from the Philippines and the representative writings from the different regions of the country and from the National Artists for Literature.

Chapters 6 to 11 are representative texts from the different continents of the world originally written in the 21st century.

21st century literatures are literary works written and published at the latter part of the 21st century (from 2001 onwards). These works are often characterized as gender sensitive, technologically alluding, culturally pluralistic, operates on the extreme reality or extreme fiction, and questions conventions and supposedly absolute norms.

DepEd K-12 Curriculum Compliant
Outcomes Based Education (OBE) Designed
Grade Level: Grades 11/ 12
Semester: 1st Semester
Strands: ABM, HUMSS, STEM, GAS
Authors: Palencia M, Cruz J.
ISBN: 978-621-436-029-1
Edition: Third Edition
Year Published: 2019
Language: English
No. of pages: 400
Size: 7 x 10 inches

Contents:

Chapter 1 – 21st Century Philippine Literature
Chapter 2 – History of Philippine Literature
Chapter 3 – Philippine Literary Canon
Chapter 4 – National Artists for Literature
Chapter 5 – Selected Texts in 21st Century Philippine Literature
Chapter 6 – 21st Century World Literature
Chapter 7 – 21st Century Asian Literature
Chapter 8 – 21st Century Anglo-American Literature
Chapter 9 – 21st Century Continental European Literature
Chapter 10 – 21st Century Latin American Literature
Chapter 11 – 21st Century African Literature
Chapter 12 – Critical Approaches to Literature

CONTACT INFORMATION:

https://www.azespublishing.com

Bank Drive, Ortigas Center, 
Mandaluyong City, Philippines 1550 
Landline: +63 2 8515-9557 
Globe: +63 967-236-7338 
Smart: +63 961-362-2635 
sales@azespublishing.com 
azespublishingcorp@gmail.com 

Authorized Online Distributors

LAZADA 1

LAZADA 2

SHOPEE 1 

SHOPEE 3

CAROUSELL

Creative Writing, 2nd Edition

About the book:
This textbook aims to develop practical and creative skills in reading and writing; introduce students to the fundamental techniques of writing fiction, poetry, and drama; and discuss the use of such techniques by well-known authors in a variety of genres. Activities are devoted to the examination of techniques and to the workshop of students’ drafts toward the enrichment of their manuscripts. Students will learn how to combine inspiration and revision, and to develop a sense of form.

DepEd K-12 Curriculum Compliant
Outcomes Based Education (OBE) Designed
Grade Level: Grades 11/ 12
Semester: 1st Semester
Strands: HUMSS, GAS
Authors: Palencia M, Chancoco J, Garcia M.
ISBN: 978-621-436-021-5
Edition: Second Edition
Year Published: 2019
Language: English
No. of pages: 352
Size: 7 x 10 inches

Contents:
Chapter 1 – In Your Write Mind: Following the Writer’s Trade
Chapter 2 – The Process of Writing: Whatever Works
Chapter 3 – Reading and Writing Poetry: For Better or Verse
Chapter 4 – Reading and Writing Fiction: The Long and Short of It
Chapter 5 – Reading and Writing Drama: Finding the Shakespeare in You
Chapter 6 – Final Output – Writing Prompts for Poems, Stories and Drama

CONTACT INFORMATION:

https://www.azespublishing.com

Bank Drive, Ortigas Center, 
Mandaluyong City, Philippines 1550 
Landline: +63 2 8515-9557 
Globe: +63 967-236-7338 
Smart: +63 961-362-2635 
sales@azespublishing.com 
azespublishingcorp@gmail.com 

Authorized Online Distributors

LAZADA 1

LAZADA 2

SHOPEE 1 

SHOPEE 3

CAROUSELL

Contemporary Philippine Arts from the Regions, 3rd Edition

About the book:
This textbook covers various contemporary arts practices from the different regions in the Philippines. It aims to provide students with an appreciation of a broad range of styles in the various disciplines with consideration on their mediums, elements and principles, and engage them to an integrative approach in studying arts. Through this textbook, students will broaden and acquire the necessary creative tools that open opportunities in pursuing their individual career goals and aspirations.

DepEd K-12 Curriculum Compliant
Outcomes Based Education (OBE) Designed
Grade Level: Grades 11/ 12
Semester: 1st or 2nd Semester
Strands: ABM, HUMSS, STEM, GAS
Authors: Palencia M, Cruz J.
ISBN: 978-621-436-023-9
Edition: Third Edition
Year Published: 2019
Language: English
No. of pages: 384
Size: 7 x 10 inches

Contents:
UNIT 1 – INTEGRATIVE ART AS APPLIED TO CONTEMPORARY ART
Chapter 1 – The Study of the Humanities and the Arts

UNIT 2 – CONTEMPORARY ARTS IN THE PHILIPPINES
Chapter 2 – Contemporary Philippine Art
Chapter 3 – National Artists of the Philippines
Chapter 4 – Gawad sa Manlilikhang Bayan

UNIT 3 – DIFFERENT CONTEMPORARY ART TECHNIQUES AND PERFORMANCE PRACTICES
Chapter 5 – Subject, Function, Medium, Organization and Style

UNIT 4 – CONTEMPORARY ARTS PRODUCTION
Chapter 6 – The Visual Arts: A Feast for the Eyes
Chapter 7 – The Auditory Arts: Of Sense and Sound
Chapter 8 – The Performing Arts: Stories that Move

CONTACT INFORMATION:

https://www.azespublishing.com

Bank Drive, Ortigas Center, 
Mandaluyong City, Philippines 1550 
Landline: +63 2 8515-9557 
Globe: +63 967-236-7338 
Smart: +63 961-362-2635 
sales@azespublishing.com 
azespublishingcorp@gmail.com 

Authorized Online Distributors

LAZADA 1

LAZADA 2

SHOPEE 1 

SHOPEE 3

CAROUSELL

Cloud Security Best Practices

Two of the most common security issues in AWS are platform misconfigurations and credential mismanagement.  Although AWS offers many security features, if they are not used or not configured correctly, your applications and data will be vulnerable .  However, these common security issues can be easily mitigated using the following best practices:

1.  Use VPCs (virtual private clouds). Amazon Virtual Private Cloud (Amazon VPC) enables you to launch AWS resources into a virtual network that you’ve defined. This virtual network closely resembles a traditional network that you’d operate in your own data center. It is logically isolated from other virtual networks in the AWS Cloud. You can launch your AWS resources, such as Amazon EC2 instances, into your VPC.  You can apply security groups and access control lists to the VPC to secure it.

2. Limit administrative access with AWS Security Groups. A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. When you launch an instance in a VPC, you can assign up to five security groups to the instance. For each security group, you add rules that control the inbound traffic to instances, and a separate set of rules that control the outbound traffic.  Security groups helps block attackers who may try to probe your AWS environment.

3. Lock down your root, domain, and administrator-level account credentials. For day-to-day operations, use your own account and only use these privileged accounts when absolutely necessary.  Don’t share passwords and only a handful of administrators should have possession of the passwords.

4.  Use IAM Roles. An IAM role is an IAM identity that you can create in your account that has specific permissions. An IAM role is similar to an IAM user, in that it is an AWS identity with permission policies that determine what the identity can and cannot do in AWS. However, instead of being uniquely associated with one person, a role is intended to be assumable by anyone who needs it. Also, a role does not have standard long-term credentials such as a password or access keys associated with it. Instead, when you assume a role, it provides you with temporary security credentials for your role session. IAM roles can be used to define permission levels for different resources and applications that run on EC2 instances. When you launch an EC2 instance, you can assign an IAM role to it, eliminating the need for your applications to use AWS credentials to make API requests. 

5. Enable Multi Factor Authentication (MFA). MFA is a simple best practice that adds an extra layer of protection on top of your user name and password. With MFA enabled, when a user signs in to an AWS website, they will be prompted for their user name and password (the first factor—what they know), as well as for an authentication response from their AWS MFA device (the second factor—what they have). Taken together, these multiple factors provide increased security for your AWS account settings and resources.

6. Mitigate distribute denial of service (DDoS) attacks by using elastic load balancing, auto scaling, Amazon Clouldfront, AWS WAF, or AWS Shield. AWS provides flexible infrastructure and services that help customers implement strong DDoS mitigations and create highly available application architectures.

7. Monitor your environment by using AWS tools including CloudTrail, CloudWatch and VPC Flow Logs.  They provide information about how data flows in and out of your AWS environment. They also provide data that you can mine and analyze to check intrusions, security breaches, and data leaks. You can also integrate these tools with third party applications that can perform thorough log analysis and event correlation.

Source: https://docs.aws.amazon.com/

Azes Publishing Corporation

ANNOUNCEMENT

https://azespublishing.com/

We recently launched Azes Publishing Corporation – a publisher and distributor of Philippine textbooks.

Our mission is to provide the Philippine market with quality and affordable learning materials
from pre-school to post-graduate studies.

Our vision is to become an industry leader in the production and distribution of quality textbooks and other learning materials in the Philippines.

For more information, visit our website at https://azespublishing.com/