AV-2
All-View: Integrated Dictionary (AV-2)
All-View: Integrated Dictionary (AV-2)
Technology:
AI Agents -- AI Prompts --
ACDI (Automated Cryptography Discovery and Inventory) -- [See PQC] A process of automatically finding and listing cryptographic keys and algorithms within an IT infrastructure. This is important for security purposes, as it allows organizations to track and manage their cryptographic assets, ensuring they are used properly and securely.
Adaptive Planning: A business strategy that prioritizes flexibility and continuous adjustments (pivot) within the planning process. This is especially valuable in today's dynamic business world, where market conditions and priorities can shift quickly. -- VALUE (3): (1) Agility and Adaptability: The core principle is to move away from rigid, static plans and embrace the ability to make adjustments and "pivot" quickly when needed. (2) Scenario Planning: This involves considering different future possibilities (positive and negative) and having plans in place to address them (aka Risk Mgmt). This allows for better preparedness in a fast-changing environment. (3) Collaboration: Effective communication and information sharing across departments are crucial for making informed adjustments during the planning cycle. -- TOOLS: Excel; MS Teams; and Adaptive Insights by Workday.
Adjective: Words that describe the qualities or states of being of nouns: enormous, doglike, silly, yellow, fun, fast.
Affiliate Marketing & Platforms --
Platform: ClickBank -- (Usr: ctf...gmail // Pwr: XXX1!!...1 // Phone: 8815).
Find Affiliate Products: Click Affiliate Marketplace; choose a category . . .
Find your CB Accounts: Click Accounts...
Active Accounts: vviralmeta.
Agentic AI: A form of AI designed to function autonomously. It is different from traditional AI and generative AI because it can make decisions, perform tasks, and adapt to its environment without constant human intervention, to automate a broader range of tasks with minimal supervision.
AI Agent: An AI Agent is a system that can autonomously perform tasks, make decisions, and interact with its environment based on prompts. -- See AI / ML / AQ.
AI Prompt Engineering: See AI / ML / AQ.
All DoD & Federal Agencies:
Federal Agencies: https://www.usa.gov/agency-index
Ambulate: (1) The act of walking or moving from one place to another. It implies a change in position. (2) While someone who is ambulating might be standing at some point during their walk (e.g., pausing to look at something), standing itself isn't considered ambulating. (3) Ambulate is a more formal way of saying "to walk." So, the whole statement means that the person has a sedentary lifestyle and needs to incorporate daily walking for their health.
Sedentary: This means someone sits for extended periods throughout the day. Examples include office workers who sit at desks, gamers who sit for long stretches, or people who travel long distances by car or plane.
Analysis of Alternatives (AoA) -- A document that identifies and analyzes alternative solutions for a given problem (used by PMP). It evaluates different choices available for achieving technical objectives, including measures of effectiveness, cost, schedule, concepts of operations, and overall risk. The AoA assesses the critical technology elements associated with each proposed material solution, including integration risk, manufacturing feasibility, and, where necessary, technology maturation and demonstration needs. It also considers the government budget and funding limitations and includes a cost-benefit analysis and life cycle cost. -- Examples: (1) Contract Data Requirements List (a form). (2) See: CDW-G\-- DOE\-- PROJECTS\ROADMAP (DOE, Y-12)\Roadmap -- (OV-5) -- & -- Analysis. (3) DOE & NNSA Project Management by GAO.
API (Application Programming Interface) -- Allows different software applications to communicate with each other. -- See the "Tunnel" analogy:
Toll Booth -- Entry point into the Tunnel -- API Gateway (entry, on-ramp).
Cars, Trucks, Buses, etc. -- Microservice(s) -- Travels in the Tunnel (the internet).
The Tunnel -- the internet.
On-ramps (Entry) & Off-ramps (Exits) -- API -- Assures entry and exit of the cars (endpoint).
The Client -- The Driver / Microservice / AI Agent -- Decides when to enter and exit.
Application Portfolio Management (APM): -- BLUF: A disciplined approach to managing an organization's portfolio of software applications. It involves the systematic evaluation, planning, and governance of applications to ensure they align with business objectives and deliver maximum value. Key aspects, click here.
Application Rationalization -- BLUF: (1) A strategic process of evaluating an organization's entire portfolio of software applications to identify which ones should be kept, replaced, retired, or consolidated. The primary goal is to optimize the application landscape for efficiency, reduce redundancy, lower costs, improve security, and better align IT with core business objectives. (2) Application rationalization is about creating a healthy, optimized, and cost-effective application portfolio that effectively supports the organization's current and future needs. It's often an ongoing process, as business needs and technology landscapes are constantly evolving/changing.
Common Steps (3): (1) Inventory and Assessment: It begins with a comprehensive inventory of all applications, gathering data on their functionality, business value, technical fit (e.g., architecture, health, scalability, risks), usage, and total cost of ownership (TCO). (2) Analysis and Categorization: Applications are then analyzed against predefined criteria and categorized. Common outcomes for applications include: (2.1) Retain: Keep the application as is, as it provides significant value and is technically sound. (2.2) Replace/Replatform/Rehost/Re-architect/Repurchase: Migrate to a new solution, upgrade, move to a different environment (like the cloud), rebuild, or buy a new commercial off-the-shelf (COTS) product. (2.3) Consolidate: Merge multiple applications with overlapping functionality into a single, more efficient solution. (2.4) Retire/Decommission: Remove applications that are redundant, obsolete, underutilized, or no longer serve a business purpose. (3) Roadmap and Implementation: Based on the assessment, a roadmap is created outlining the actions for each application, along with timelines, budgets, and resource allocation. The final step is to implement these changes.
Value (6): (1) Cost Reduction: Eliminating redundant or underutilized applications, reducing licensing fees, and lowering maintenance costs. (2) Improved Efficiency: Streamlining processes, reducing complexity, and freeing up IT resources for more strategic initiatives. (3) Reduced Technical Debt: Addressing outdated technology, security vulnerabilities, and system dependencies. (4) Enhanced Security: Minimizing the attack surface by reducing the number of applications and their integration points. (5) Better Business Alignment: Ensuring that IT investments directly support business goals and strategies. (6) Increased Agility: Creating a leaner, more adaptable IT environment that can respond quickly to changing business needs.
Assess ("I Assess..."): "I assess" typically means that the speaker or writer is evaluating, examining, judging, or estimating something based on available info or criteria (aka AuthS). It implies a process of examination or analysis to form an opinion or make a decision. For example, "I assess the situation" means that the person is carefully considering various aspects of the situation to understand it better or to make a judgment about it. -- It is not a suggestion but rather an indication that you are forming an opinion or making a judgment based on your assessment.
Assessments (Product Assessment) -- BLUF: The action or instance of making a judgment about something: the act of assessing something: an appraisal. assessment of a product, process, or damage. -- Also see, Assessment Process. -- Assessment focuses on understanding an individual's strengths and weaknesses to inform their learning and progress, while evaluation is about making judgments about the value, effectiveness, or quality of something, often to guide decision-making. When comparing software, the best word to use is comparison, as it highlights the difference in features, performance, or other relevant aspects.
Capterra.com --
Gartner Peer Insights -- Gartner Peer Insights - Gartner Peer Insights offer reviews of Crowdstrike and other EPP solutions from real-world users. -- Google: "Gartner Peer Insights <VendorName>"
IDC -- BLUF: IDC examines consumer markets by devices, applications, networks, and services to provide complete solutions for succeeding in these expanding markets
Mitre ATT&CK Evaluations -- Mitre ATT&CK Evaluations [invalid URL removed] - This resource allows HHS to compare the effectiveness of different endpoint protection platforms against various adversary tactics. -- Google "Mitre ATT&CK Evaluations". This should lead you to the official MITRE website where you can explore the program.
VeraCode --
Augment -- Make (something) greater by adding to it; increase its value. "He augmented his summer income by painting houses."
Authoritative Sources (AuthS): AuthS are recognized, credible, and trustworthy origin of information. These sources are considered reliable because they are written by experts, based on rigorous research, and often go through a peer-review process.
Examples: NIST, CISA, etc.
Author's Purpose or Narrative Purpose: When you want to explain why you wrote a narrative rather than describe its content, for the intended significance, motivation, or message behind creating the story.
Autogen -- A framework that enables developing LLM (Large Language Model) applications using multiple AI agents.
CAB (Change Advisory Board): A CAB delivers support to a Change-Management team by advising on requested changes, assisting in the assessment and prioritization of changes. This body is generally made up of IT and Business representatives that include: a change manager, user managers and groups, product owners, technical experts, and possible third parties and customers (if required) -- CAB is in ITIL.
CAI (Commercially available information ): Any data or information that is available for purchase or license from a commercial entity or data broker. CAI can include information collected from a wide range of sources, such as cell phones, cars, household appliances, and social media accounts.
CDM (Continuous Diagnostic and Mitigation): [Edge via EDA-Endpoint, Detection, and Response] Providing federal agencies with continuous monitoring, diagnostics, and mitigation capabilities to better understand their network security posture, identify vulnerabilities, and respond to threats in real time. -- Azure tools (4): (1) Azure Security Center: Provides continuous monitoring for security vulnerabilities, threat detection, and incident response capabilities to help organizations detect and respond to potential security threats. (2) Azure Policy: Allows organizations to define and enforce policies on their Azure resources to ensure compliance with security standards and regulatory requirements. (3) Azure Monitor: Provides real-time monitoring and alerting capabilities for Azure resources to help organizations detect and respond to security incidents. (4) Azure Sentinel (SIEM): Offers a cloud-native SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) solution that provides advanced threat detection and response capabilities. -- Other tools: (1) Elastic: Offers CDM and EDR (Endpoint, Detection, and Response as per EO 14028, Section 8).
CESS (Customer Edge Security Stack): [Edge] CESS is a comprehensive suite of security solutions that help organizations protect their network, data, and applications from cyber threats at the edge. This stack typically includes tools such as firewalls, intrusion detection and prevention systems, secure web gateways, and email security solutions. -- Azure tools: Azure can stack security solutions like: Azure Firewall, Azure DDoS Protection, Azure Security Center, Azure Sentinel (SIEM), and more. -- Other tools: Palo Alto Networks Prisma SASE: This cloud-delivered solution combines Secure SD-WAN, Next-Gen Firewall, and Cloud Edge Secure Web Gateway capabilities, offering a unified approach to network security at the edge.
C/O ("c/o") Care of: The "c/o" (care of) indicates that, for example, "c/o Danny Nacman" is the intermediary who receives the payment on behalf of the landlord. The tenant's responsibility is to get the payment to Danny Nacman. Once Danny Nacman receives the payment, he is then responsible for getting it to the landlord. This is a common arrangement in property management, where an agent, manager, or a trusted individual handles the rent collection for the property owner (the landlord).
Cognitive space: Refers to the mental or conceptual space in which individuals organize and process information. It is a way of understanding how people think, reason, and make decisions.
Colleague(s): An associate or coworker typically in a profession or a civil or ecclesiastical office and often of similar rank or status.
Comparison: When comparing software, the best word to use is Comparison, as it highlights the difference in features, performance, or other relevant aspects. Evaluation is about making judgments about the value, effectiveness, or quality of something, while Assessment focuses on understanding an individual's strengths and weaknesses to inform their learning and progress, often to guide decision-making.
Also see "Assessments" in AV-2.
https://alternative.me/ : Find Better Software Alternatives.
https://alternativeto.net/ : Crowdsourced software recommendations
https://www.yeschat.ai/gpts-9t557MpFSV6-Similar-Apps : Find Similar Apps.
Conference(s):
Go to "EVENTS."
CONUS (Contiguous United States). OCONUS (Outside Contiguous United States).
CRE (Commercial Real Esate).
Critical Path: The Critical Path is the path/sequence of tasks that, if any of them are delayed, will directly delay the entire project's completion date. -- It's the longest path of interconnected tasks from start to finish, and it shows you the minimum time needed to complete the project. If you want the project done on time, you absolutely cannot allow any task on this path to fall behind schedule. -- Example: The sequence of tasks that must happen in order, and whose combined time determines the earliest a project can finish, is: Task B (5 days) > Task A (3 days). The Dependency is Task B (Task A cannot start until Task B is done! In this example, the Critical Path is the path/sequence (1) Task B (5 days) > (2) Task A (3 days). -- Also see "Dependency"
Critical Thinking -- The analysis of available facts, evidence, observations, and arguments to form a judgment by the application of rational, skeptical, and unbiased analyses and evaluation.
CRQC (Cryptanalytically Relevant Quantum Computer): A type of quantum computer that poses a significant threat to current encryption methods. -- CRQC's are not here yet --
Cryptanalysis: The art of breaking codes and deciphering encrypted messages.
Cryptanalytically Relevant: Powerful enough to run algorithms that can crack the encryption methods widely used today (mostly public-key cryptography).
Cryptanalysis: The art of breaking codes and deciphering encrypted messages.
Cryptanalytically Relevant: Powerful enough to run algorithms that can crack the encryption methods widely used today (mostly public-key cryptography).
Cryptographic System: An active software or hardware implementation of one or more cryptographic algorithms that provide one or more of the following services: (1) creation and exchange of encryption keys; (2) encrypted connections; or (3) creation and validation of digital signatures. See "OMB M-23-02 Migrating to PQC."
Data at Rest (RAR): Refers to data that is stored on a device and not actively being transferred or accessed, like files on a hard drive.
Date-Centric File Structure: A data-centric file structure prioritizes data as the primary, independent asset, rather than being tied to specific applications or formats, enabling easier data access, sharing, and reuse across different systems and applications.
Data in Transit (DIT): Represents data that is actively moving between different systems or networks, such as data sent via email
Data in Use (DIU): Indicates data that is currently being accessed and processed by a user or application.
Data Pipeline: A data pipeline is a series of steps used to move data from a source to a target destination. The process involves collecting, transforming, and routing data to where it needs to be stored or used. Data pipelines are essential for building solutions in cybersecurity, business intelligence, and other fields that rely on data processing. -- The process typically involves: (1) Ingestion: Collecting data from various sources. (2) Transformation: Cleaning, organizing, and reformatting the data. (3) Delivery: Moving the processed data to its final destination.
Data-types (in a general sense).
Quantitative data: Numerical-Measurement data that can be measured and counted. Like: (1) Numbers: 1, 2, 3, 4...; (2) Measurements: Weight, height, temperature, distance; and (3) Counts: Number of people, occurrences of an event
Qualitative data: Descriptive for Analysis data that cannot be measured numerically. It's often used to describe qualities, characteristics, or perceptions. Like: (1) Descriptions: Colors, shapes, textures ; (2) Opinions: Beliefs, attitudes, feelings ; (3) Categories: Types, groups, labels.
Data types (e.g., integer, float, string, boolean) refer to the specific format and representation of data within a programming language.
Dependency: A dependency means that one thing (a task, an event, or an outcome) cannot start or be completed until another specific thing is finished or in place. -- Example: "A relies on B." So, A can't happen until B is done. -- Also see "Critical Path."
DIABETES HEALTH:
10 Foods to Eat To Manage Diabetes (10): (1) Beans (2) Dark Leafy Greens (3) Fatty Fish: Salmon, tuna, mackerel, and sardines (4) Berries (5) Whole Grains (6) Sweet Potatoes (7) Avocados (8) Eggs (9) Nuts and Seeds (10) Greek Yogurt.
Digital Transformation (DX or DT): -- BLUF: the process of using digital technologies to create new, or modify existing, business processes, culture, and customer experiences to meet changing business and market requirements. It's a fundamental shift in how an organization operates and delivers value. -- 3 Parts to DX:
Building a Digital Culture: Bringing Your People Along.
Modernizing Your IT: Choosing the Right Technology (in the cloud, and secured)...
Digital Opportunities: Seeing the savings and the ROI...
DMARC (Domain-based Message Authentication, Reporting & Conformance). It's an email security protocol that adds an extra layer of protection against email spoofing. By implementing DMARC, you can significantly reduce the risk of email spoofing and phishing attacks that target your domain. Spoofing is a tactic used in phishing attacks where attackers disguise their emails to appear as if they're coming from a legitimate source, like your company or bank. -- VALUE: DMARC works by building on two other existing email authentication protocols: Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). -- INFO: (1) SPF and DKIM verify if an email is actually coming from the domain it claims to be from. (2) DMARC builds on SPF and DKIM by letting domain owners instruct email servers on what to do with emails that fail authentication (i.e., emails that aren't from authorized sources). DMARC also allows for reports to be sent to the domain owner about emails that failed authentication.
DevSecOps (Development, Security, and Operation): A methodology that combines development, security, and operations processes to ensure continuous security throughout the software development lifecycle (SDLC). -- Focus: To enhance security and manage security risks throughout the SDLC process. This approach focuses on integrating security practices and tools at every stage of the SDLC process, starting from the initial planning phase to ongoing monitoring and maintenance. -- Azure tools (5): (1) Azure DevOps: Helps teams plan, build, and deploy software applications, version control, build automation, release management, and project tracking, implement security practices, and automate security checks throughout the SDLC process. (2) Azure Security Center: Helps organizations monitor the security of their Azure resources and detect and respond to security threats. It provides continuous security assessments, recommendations for improving security posture, and integration with other Azure services to automate security checks and remediation tasks. (3) Azure Sentinel (SEIM): Helps organizations detect, investigate, and respond to security incidents. It provides advanced threat detection (ATD) capabilities, machine learning-based analytics, and integration with other Azure services to help organizations proactively manage security risks. (4) Azure Key Vault (Initial steps in ZT and PQC): Helps organizations securely store and manage cryptographic keys, secrets, and certificates. It provides a centralized location for managing sensitive information, with features for access control, auditing, and monitoring to help protect data and prevent unauthorized access. (5) Azure AD: MFA, SSO.
DoH & DoT: -- BLUF: (1) Modern security protocols designed to enhance the privacy and security of Domain Name System (DNS) queries. (2) Both DoH (DNS over HTTPS) and DoT (DNS over TLS) secure DNS communications by encrypting DNS queries, but DoH uses HTTPS (port 443) while DoT uses TLS (port 853). Both methods help prevent surveillance and manipulation of DNS traffic, supporting Zero Trust and modern cybersecurity best practices.
Due Process: Fair treatment through the normal judicial system.
Dynamic Network Rule Technologies: [Great for ZT] -- BLUF: A set of technologies that enable network security rules to be automatically adjusted and enforced based on real-time context and conditions. -- Does: (1) Context-Aware Security: Considering factors like user identity, device posture, app behavior, and time of day to dynamically adjust network access. (2) Automation and Orchestration: This allows for rapid and consistent enforcement of security policies. (3) Micro-segmentation: Creates granular security zones within a network which limits the lateral movement of attackers. (4) Software Defined Networking (SDN): Allows for centralized control and programmability of network devices.
EQUITY ASSETS. -- BLUF: Primarily refer to ownership stakes in companies (stocks). There are two primary ways to make money from them:
Capital Gains: You buy a stock for $50 per share and sell it for $75 per share, making a $25 per share capital gain.
Dividends: You own 100 shares of a company that pays a $2 dividend per share annually. You'll receive $200 in dividend income.
Solutions to make More $$: You can reinvest dividends to buy more shares.
Evaluation: Evaluation is about making judgments about the value, effectiveness, or quality of something, while Assessment focuses on understanding an individual's strengths and weaknesses to inform their learning and progress, often to guide decision-making. -- When comparing software, the best word to use is Comparison, as it highlights the difference in features, performance, or other relevant aspects.
EVENTS.
Cybersecurity Summit: [Various Dates, On-Site] BLUF: Connecting Business with Renowned Information Security Experts and Cutting-Edge Solution Providers.
ASTA Conference -- [May] BLUF: A travel and advisor conference held in May. The only industry event where you can learn new and innovative ways to sell travel AND get guidance on how to effectively run and grow a travel business. It is located in Dallas, TX.
ATARC (Advanced Technology Academic Research Center) [Various Dates, Virtual] -- BLUF: ATARC provides a collaborative forum between government, industry, and academic leaders to resolve emerging technology challenges.
Enterprise Architecture Summit: [June, Virtual] One of the largest online EA virtual conferences!
RSA Conference ($$$) [Apr or May, Virtual] -- BLUF: A technology innovation conference in May. Location: San Francisco, CA.
Executive Order (EO) 14028: EO 14028, known as "Improving the Nation's Cybersecurity," was signed by President Biden on May 12, 2021. It aimed to address the growing threats of cyberattacks and data breaches by enhancing cybersecurity measures across the U.S. government and its software supply chain. -- Main Goals (3): (1) Strengthen cybersecurity (2) Secure software supply chain: Address vulnerabilities in the software used by the government by implementing secure development practices and standards. (3) Enhance incident response: Establish a standardized approach to identify, respond to, and recover from cyberattacks. -- Key provisions (5): (1) ZTA. (2) Cybersecurity Safety Review Board: Establishes a board to analyze major cyber incidents and make recommendations for improvement. (3) Software security measures: Define standards and best practices for secure software development and acquisition. (4) Threat information sharing: Sharing of threat information between government and private sector entities. (5) Cybersecurity training: Mandates cybersecurity training for all federal employees. -- Current Status: NIST and CISA are supporting ZTA.
Fascism. (Political Ideology) Fascism is a far-right form of government in which most of the country's power is held by one ruler or a small group, under a single party. Fascist governments are usually totalitarian and authoritarian one-party states.
FISMA (Federal Information Security Modernization Act): FISMA is a U.S. law that mandates federal agencies, including state agencies administering federal programs and private companies working with the government, to implement and maintain information security programs. These programs are designed to protect sensitive government information and operations from various threats.
To improve their FISMA scorecard (Ref.), federal agencies should focus on strengthening their information security programs by ensuring compliance with FISMA requirements, which include implementing continuous monitoring, conducting regular security assessments, and maintaining a strong security posture. They also need to align their information security programs with agency goals and consider factors like workforce capabilities and agency size when developing metrics.
(Reference, Online) 7.4 FISMA Reporting | via CIO.gov.
(Reference, PDF) FY 2024 CIO FISMA Metrix v1.0, Dec 2023.
Fold Clothes: -- BLUF: A new way to fold and store clothes more efficiently.
FOSS (Free and Open Source Software): FOSS tools is software that you can download and use for free, with the source code available for anyone to inspect, modify, and distribute. This openness can foster collaboration and customization, but may require more technical expertise for setup and maintenance. -- Resources:
FOSS License Selection Tool: Choose an appropriate open-source license for your code if you plan to share it: https://choosealicense.com/
Finding Open Source Projects: Explore GitHub for FOSS projects: https://github.com/Index
Contributing to Open Source: Guide for beginners on contributing to open-source projects: https://contribute.freecodecamp.org/
FRAMES:
CanvasOnDemand.com -- Good prices on pictures and frames, including a saw tooth hanger. I need a nail on the wall—16x20 for $25.75.
Framework: From an EA perspective, "framework" is the logical context for describing CISA ZTMM, NIST 800-53r5, CISA TIC 3.0, etc., because they provide a structured approach, guidelines, best practices, and a common language for addressing specific domains. They may also be called "guidance," "standards," or "models."
Funders. A website in The Hub that lists funding opportunities, references, and information for startups.
GRC (Governance, Risk Management, and Compliance) Program. (3+8=8)
Governance refers to the policies, procedures, and leadership that guide an organization towards its objectives.
Risk Management involves identifying potential threats to the organization and taking steps to mitigate them.
Compliance ensures the organization follows all relevant laws and regulations. NIST. Audits
Training and Awareness.
Monitoring and Reporting
Continuous Improvement.
Integration.
Culture.
Guarantor: A guarantor is an individual who agrees to take on financial responsibility for another person's debt or obligations if that person fails to meet them.
HEALTH.
DiaPlan (Endocronology):
MyCigna.com: (Usr: jsgonzales757 // XXX) -- Medical and Pharmacy Provider.
My Doctor: Bayview Physicians Group: (ctf...gmail // XXX).
Vain/Feet Doctor: National Vascular Associates/Mountain Spring Vascular -- Doctor: SHAILRAJ PARIKH, MD -- Loc: 5589 Greenwich Rd, #100, Virginia Beach, VA 23462.
Hedge Funds.
BLUF: A hedge fund is a private investment fund that pools money from high-net-worth individuals and/or institutional investors, often intending to perform risk-adjusted returns via hedging.
Case #1 (Carthage Capital): Use "statistical modeling and analysis" to trade options.
If my fund is $15M, and I make a 30% Yearly Profit Target, the YPT is $4.5M. -- I make 8% of my fund ($15M x .08 = $1.2M)
HITL (Human-In-The-Loop).
Home Warranty Services.
HomeServe: -- BLUF: Plumbing, Electrical, and Heating & Cooling (HVAC).
Human Capability Barrier (HCB). -- BLUF: Using geometry or trigonometry, 90 degrees right angle...
Determining the Goal (the "Star") using the right angle;
Vertical Line/Left line: People/Training;
Horizontal line/Bottom line: Process & IT. Line up #2 & #3 where they are (this is the As-Is/Present-State).
Now, determine how to get from this "Present-state" to the "Star" (the Future-State) maturing People, Process, and Technology (PPT) to meet the "Star."
HOMES.
Prefabricated Homes: (YouTube) 100k homes (2-3b) in 48 hours.
Hypocritical: behaving in a way that suggests one has higher standards or more noble beliefs than is the case
Impediments: A hindrance or obstruction in doing something.
Inertia: The tendency of objects in motion to stay in motion and objects at rest to stay at rest, unless a force causes their speed or direction to change. It is one of the fundamental principles in classical physics and was described by Isaac Newton in his first law of motion (also known as The Principle of Inertia).
Intrusion Detection System (IDS): A solution that monitors and analyzes network events to detect security incidents and imminent threats. -- Intrusion Prevention System (IPS): A solution that performs intrusion detection and then goes one step ahead and prevents any detected threats. -- Tool: Azure Firewall Premium.
Intrusion Prevention System (IPS): A solution that performs intrusion detection and then goes one step ahead and prevents any detected threats -- Intrusion Detection System (IDS): A solution that monitors network events and analyzes them to detect security incidents and imminent threats. -- Tool: Azure Firewall Premium.
ISCM (Information Security Continuous Monitoring): To maintain ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions using security tools, policies, and processes. Source: NIST SP 800-137
Lobbyists: Lobbyists are essentially professional advocates. They work on behalf of individuals, organizations, or businesses to influence government decisions.
M.A.C.H. Architecture -- Microservices-based, API-first, Cloud-native, and Headless (MACH). (Used for USAF AI/ML Enemy Target Application for the IC)
-(1)- Microservices. Individual pieces of business functionality (code) that are independently developed, deployed, and managed. Replaces the traditional, monolithic architecture and allows applications to be arranged as a collection of loosely coupled and independently deployable services (code).
-(2)- APIs: (like a waiter) Exposes all application functionality through an API, making it possible for two or more apps or services to interact & function. Defines how apps communicate with each other to exchange data or functionality
-(3)- Cloud: AWS, Azure, Google. Leverages SaaS to store, host, elastically scale, and automatically update functionality.
-(4)- Headless: Non-Server Reach-back. Decouples the front-end presentation experience from back-end logic which provides freedom of design for creating user interfaces for multiple channels and allows enterprises to remain framework agnostic.
Plus "No Code/Low Code" (NC/LC).
References (4): (1) MACH Alliance. (2) MACH Certified. (3) MACH Architecture: What It Is, Why You Should Know It. (4) Making the move to a MACH Architecture.
MARKETING & PROMOTIONS.
HVAC LeadFlow System: Copy this marketing and lead generation process. -- STEPS (5): (1) Post ads on Social platforms & do Short Videos; (2) direct users to a website to view mini-reports, articles, OR stories about you to build a relationship; (3) have them learn or offer more by capturing their emails (4) do email follow-up by thanking them and/or offering more stories and content (5) they buy and/or attend shows.
MARKETPLACE.
Flippa.com.-- BLUF: Buy and Sell Online Businesses, Websites, and Apps.
Meta Tag.
In SharePoint: Allows users to tag or categorize content with specific choices, such as Summary, Document, Notes, or a combination. Metadata columns help in organizing, searching, sorting, and filtering information within SharePoint, making it easier to manage and retrieve content. -- Notes: Meta tags do not work in folders, Only documents. -- How2: Click 3-dots; More; Properties...
Micro-Segmentation: Aligns with Zero Trust. It is a security technique that involves dividing a data center or cloud environment into granular security zones. This allows for the application of precise security policies to individual workloads, applications, or even specific functions within an application. -- Granular Security: Unlike traditional network segmentation, which might divide a network into broad zones (e.g., "servers," "desktops"), micro-segmentation creates much smaller, more specific segments. This allows for very fine-grained control over network traffic. -- Micro-segmentation focuses on protecting individual workloads (e.g., virtual machines, containers, applications). -- useful in cloud and containerized environments. -- typically use software-defined networking (SDN) and virtualization technologies to create these granular segments.
Microsoft Tech Community: Gain insights.
Modularity: Reusability, Flexibility, and Scalability are the focus.
MOU (Memorandum of Understanding). -- An MOU is a document that describes the broad outlines of an agreement that two or more parties have reached. MOUs communicate the mutually accepted expectations of all of the parties involved in a negotiation.
MUSIC.
How To Build A Home Studio For $350. Extra.
Reference: This 40-year-old makes $160,000/month in passive income—his No. 1 tip for building a 6-figure side hustle. via two online businesses — my music blog and business coaching brand.
Napoleon's Corporal: (Link) -- BLUF: To have an enlisted soldier in the planning process. -- VALUE: If someone unfamiliar with the subject matter can understand the deliverable (the context and the information it is trying to convey), it is more likely to be consumed by all intended audiences. -- The Story: During every battle plan briefing, Napoleon would have a corporal shine his boots, knowing that the Corporal was listening. When they were done, he would ask the corporal if their plans made sense. If the corporal said “Yes,” then the plans moved forward. If he said “No,” then the plans were redrawn. -- Steps: 2-types of peer review to vet the quality of a deliverable
Use someone on your team who is familiar with the subject matter to find gaps/holes and make it more comprehensive.
Use someone who can represent your Napoleon’s Corporal. See BLUF and VALUE above.
NEF (Nonrecurring Expenses Fund): NEF is a pot of money set aside to cover one-time or irregular-specific purpose expenses. It's typically found in government agencies or large organizations. -- How It Works (3): (1) Funding: Money gets added to the NEF from unspent funds allocated for specific purposes in previous years. These funds would otherwise have to be returned to the general treasury. (2) Restrictions: The NEF can only be used for specific purposes, typically large one-time expenses, often related to infrastructure or IT upgrades. These are expenses that wouldn't normally be included in the regular budget. (3) Benefits: The NEF allows for more flexibility in budgeting. By having a pool of money for unexpected or non-standard needs, agencies can react to situations without needing a whole new budget allocation. -- How It's Used: (1) Building renovations or repairs (2) Upgrading computer systems (3) Purchasing new equipment.
Network Protocols: See "(P)" for Protocols...
No Code / Low Code: -- BLUF: Building applications with minimal to no coding required. It allows a wider range of people to create software, from professional developers to those with little to no programming experience. -- VALUE: (1) Focuses on visual development (2) Faster development & deployment
NSM-10: NATIONAL SECURITY MEMORANDUM/NSM-10 (NSM) Requirements: "Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems." -- INFO: Informational read-ahead materials: IBM Security Event recording and presentations: Q-TIPS_IBM_4.10.24
Please, email SDI@hhs.gov if you have any issues accessing the folder links
NUMBERING SYSTEM.
Hierarchical/Decimal numbering: 1.0, 1.1, 1.2, 1.3, etc.
OCONUS (Outside Contiguous United States). CONUS (Contiguous United States).
ONCD (Office of the National Cyber Director). -- BLUF: ONCD is an agency in the US Government statutorily responsible for advising the President of the US (POTUS) on matters related to cybersecurity. It was established in 2021. URL: https://www.whitehouse.gov/oncd/
OPTIONS.
OptionsEducation.org -- Free Options Information.
OSI Model. (Open Systems Interconnection): BLUF: A framework used to describe how network communication works. -- Layers of the OSI Model (Bottom to Top) (7): (1) Physical Layer: This layer deals with the physical transmission of data bits over a network medium like cables or wireless signals. It focuses on how the physical devices connect and transmit raw data. (2) Data Link Layer: This layer takes the raw data from the physical layer and packages it into frames. It adds error detection mechanisms to ensure data integrity during transmission. Devices like switches and network cards operate at this layer. (3) Network Layer: This layer handles routing data packets across networks. It determines the most efficient path for data to travel from source to destination. Routers operate at this layer, forwarding packets based on their destination addresses. (4) Transport Layer: This layer ensures reliable data delivery between applications on different devices. It establishes connections, breaks large data streams into smaller packets, and manages error correction and flow control. Protocols like TCP and UDP operate at this layer. (5) Session Layer: This layer establishes, manages, and terminates sessions between applications. It allows applications to communicate and exchange data in an orderly way. (6) Presentation Layer: This layer deals with data formatting and presentation. It ensures data is presented in a way that the receiving application can understand, regardless of the underlying hardware or software differences. (7) Application Layer: This layer is the closest to the user. It provides network services to applications like email, file transfer, web browsing, and more. Applications directly interact with the network through this layer.
PII (Personally Identifiable Information): PII is any information that can be used to identify an individual, either directly or indirectly: (1) Direct identification: Information that directly identifies an individual, such as their name, address, social security number, phone number, or email address. (2) Indirect identification: Information that can be used to identify an individual when combined with other data elements, such as their gender, race, birth date, geographic location, or disease diagnosis
PKI (Public Key Infrastructure):
How HHS -- PKI credentials are loaded on your HSPD-12 "Smart" ID PIV badge, can expire*, and must be updated. These credentials allow one to log in to one's desktop/PC or other applications that require the PIV badge for IT access. -- IMPORTANT: If you do not update your PIV badge before the PKI certificate expiration date, you will then need to go to a badging office to get the certificates updated. -- How2: Update your PIV badge PKI credentials, you need to utilize the ActivClient software on your PC to update the PKI certificates on your PIV badge.
PKI is a framework for managing digital certificates and encryption keys. It provides a way to securely establish trust between different entities through these certificates.
Authentication: PKI issues digital certificates that verify the identity of users and devices trying to access a network. This aligns with Zero Trust's "never trust, always verify" principle.
Encryption: PKI enables secure communication between users, devices, and applications via a SmartCard/CAC/PIV card. This strengthens Zero Trust by protecting data integrity and confidentiality.
While PKI offers strong authentication and encryption, it's one piece of the ZT puzzle. A ZTA might also include MFA and other tools for access control.
Azure PKI tools (2*): (1) Microsoft PKI foundation (2) Azure Key Vault (*) Third-party PKI solutions
PLR (Private Label Rights): In online business and digital marketing, PLR is a licensing agreement that grants someone the right to sell a digital product (like an ebook, software, or video) as if they created it themselves, allowing them to modify, rebrand, and market it under their "own" name.
POLITICS.
The Bad Trump: 34 Felony Counts (Hush Money); Owes $454M to NYC for fraudulent business dealings; 40 out of 44 Trump cabinet members, including his VP have NOT endorsed him; A jury found Trump liable for Sexual Abuse and to pay $90+M; took classified documents and didn't give it back; Failed in delivering an "Infrastructure Bill" when he had the House & Senate; Failed to replace Obama Care; Failed to build the Wall and have Mexico pay for it; Failed to cap insulin at $35; A sorry loser...(which we teach our kids not to be); . . .
Hypocrite -- "Do as I say, not as I do.''
When one endorse Trump, you endorse "ALL of TRUMP," not just 1 or 2 items. You agree (endorse) a Felon (w/ 34 counts); Sexual abuser (A jury found Trump guilty and to pay $90M); Fraudulent business dealings (Owes $454M to NYC); Concealment of US Government classified documents, He wants to Terminate the Constitution; Tried to overturn the 2020 Presidential election (Jan 6th), and calls military people who are killed, captured, and disabled "suckers" and "Losers." When you endorse Trump, these are all okay with you, and it tells the public about your ethics, character, and integrity.
POP (Period of Performance): Refers to the timeframe during which a project, grant, contract, or agreement is authorized to be completed. It outlines the expected duration of activities and deliverables associated with the SLA.
Property Value (Get Property Value Info):
Property Search in Virginia Beach: https://propertysearch.virginiabeach.gov/
Protocols (Network Protocols).
DNS, DHCP, ARP, TCP, UDP, SSL, SSH, SCP, FTP, IPSec, etc.
Provisioning: To supply and make something available. -- Types of IT provisioning (4): (1) Server provisioning: Setting up physical or virtual servers. (2) Network provisioning: Configuring network devices and resources. (3) Storage provisioning: Allocating and managing storage space. (4) Application provisioning: Deploying and configuring software applications.
PWS (Performance Work Statement).
BLUF: (1) A PWS is a detailed document outlining the specific requirements of a contract (aka the Scope of work to be done). It's designed to clearly define a project's desired outcomes or results, rather than prescribing the methods or processes used to achieve those results. (2) By using a PWS, the federal government can ensure that contracts are awarded to the most qualified contractors.
Key Points: (1) Result-oriented: Focuses on what needs to be accomplished rather than how it should be done. (2) Measurable outcomes: Defines specific, quantifiable goals that can be used to evaluate performance. (3) Flexibility: Allows contractors to use their methods and expertise to achieve the desired results. (4) Clear expectations: Set out clear expectations for both the government and the contractor.
Inside a PWS: (1) Scope of work: Clearly defines the boundaries of the contract. (2) Performance requirements: Specifies the desired outcomes or results. (3) Performance standards: Outlines the criteria for measuring success. (4) Deliverables: Lists the specific products or services that will be provided. (5) Timeline: Establishes a schedule for completing the work.
Q-TIPS (Quantum-Technology Innovations and Product Sessions): Event training sessions in the Quantum-Technology Innovations and Product Session space.
Quick VSL (Video Sales Letter): See "VSL"
Quorum: A meeting with the minimum number of group members necessary to constitute the group at a meeting.
Rational: Based on reason or logic, rather than emotion or feeling. It implies that something is sensible, reasonable, and well thought-out.
REAL ESTATE.
FYSA: You may have to analyze 10-20 deals to find a good one.
Analyze Deals: Hover Tools; see choices under Calculators...;
BUYERS --
BuyingAmericaHomes.com: Sell Your Home AS-IS in ANY condition! Get an Offer within an hour.
InstantCashOffer.us: They buy "As-Is" with no commission, any condition, and no other fees (Req.).
OpenDoor.com: Sell and Buy Homes.
CommercialDealFinder.com -- BLUF: A platform to search for and buy CRE. -- $97/mo.
Roadmap (8 basic components): -- BLUF: A roadmap typically includes several key components to ensure clarity and direction. It provides a clear path forward and helps to align efforts towards achieving the set goals. The main parts are:
Goals and Objectives: Clearly defining what you aim to achieve is crucial. Goals are the broad outcomes you want to accomplish, while objectives are the specific, measurable steps you'll take to reach those goals.
Timeline: A roadmap should include a timeline that outlines when each objective and goal should be achieved. This helps in planning and allocating resources effectively.
Milestones: These are significant points in the timeline that mark the completion of major phases or achievements. They help in tracking progress and celebrating successes.
Tasks and Activities: Detailed actions or tasks that need to be completed to achieve the objectives. These are often broken down into smaller, manageable steps.
Resources: Identifying the resources needed, such as personnel, budget, and tools, is essential for executing the roadmap.
Dependencies: Understanding how different tasks and objectives are interconnected can help in managing risks and ensuring smooth progress.
Risks and Mitigation: Identifying potential risks and having a plan to mitigate them is important for the success of the roadmap.
Review and Adjustment: Regularly reviewing the roadmap and making adjustments as needed ensures that it remains relevant and effective.
RTIM (Real-Time Interaction Management) is a technology approach that enables businesses to deliver personalized and contextually relevant customer experiences (CX) in real time. -- Example: When you did not make an order online but decide to come into the store, the RTIM system will acknowledge your presents and offer suggestions, like discounts, etc., so you may buy at the store.
SASE (Secure Access Service Edge): [Edge, ZTA] A network architecture model that combines network security functions with wide-area networking capabilities to support the dynamic secure access needs of organizations. It provides a cloud-native solution to secure access for users, devices, and applications regardless of their location. -- Azure tools: Azure can support a SASE architecture using: Azure Virtual WAN, Azure Firewall, Azure AD, and Azure Security Center can be leveraged to implement a SASE model. -- Other Tools: Zscaler: Used at HHS. A strong SASE solution, including ZTNA and SSE features.
SCI (Sensitive Compartmented Information): This refers to a specific category of classified information with additional access restrictions beyond a standard Top Secret clearance. Access to SCI information requires special need-to-know and indoctrination programs.
SCIF (Sensitive Compartmented Information Facility): A SCIF is a secure area, room, or building where government and military personnel can store, discuss, and process highly sensitive classified information to prevent unauthorized access and eavesdropping. SCIFs are built with specialized physical and electronic security features, including reinforced, soundproofed, and signal-shielded walls, to block both physical and electronic signals & threats, and they must be formally accredited by a government agency (ex: NSA) before they can be used.
FYSA: I will be in a secure facility (just outside a SCIF) supporting a USAF program. I will have audio, but video is not permissible at this time. Thank you!
Scope Creep: Essentially, it's when a project gradually gets bigger uncontrollably and more complex than initially planned (known or unknown). -- In project management, the phrase refers to the uncontrolled expansion of a project's requirements or deliverables beyond its originally defined scope.
Sedentary: This means someone sits for extended periods throughout the day. Examples include office workers who sit at desks, gamers who sit for long stretches, or people who travel long distances by car or plane.
Ambulate: (1) This verb signifies the act of walking or moving from one place to another. It implies a change in position. (2) While someone who is ambulating might be standing at some point during their walk (e.g., pausing to look at something), standing itself isn't considered ambulating. (3) Ambulate is a more formal way of saying "to walk." So, the whole statement means that the person has a sedentary lifestyle and needs to incorporate daily walking for their health.
SIGNATURE:
James Gonzales
Enterprise Architect
Gunnison Consulting Company
E-mail: james.gonzales@hhs.gov
Since -- Example: "It has been some time since I saw her."
SoC (System on Chip). A SoC is essentially a tiny computer built onto a single microchip. It integrates all the critical components of an electronic system, like a central processing unit (CPU), memory, input/output ports, and even specialized processors for graphics or audio, onto a single piece of silicon. -- BREAKDOWN (3): (1) Components: An SoC typically includes a CPU (microcontroller, microprocessor or multiple cores), memory (RAM, ROM, FLASH), input/output ports, and other application-specific circuits. (2) Benefits: SoCs offer several advantages. They simplify device design by reducing the need for multiple separate components. This leads to smaller devices, lower power consumption, and faster development times. Additionally, integrating everything on a single chip can improve performance and security. (3) Applications: SoCs are widely used in various devices, including smartphones, tablets, laptops, gaming consoles, wearables, and even medical equipment.
Spoofing: A tactic used in phishing attacks where attackers disguise their emails to appear as if they're coming from a legitimate source, like your company or bank.
SIPOC (Suppliers, Inputs, Process, Outputs, Customers). A supply chain. Business process.
SSE (Security Service Edge). [Edge, ZTA] A cloud-based security model that delivers integrated security services to users and devices, wherever they are (see "EA" for more context). -- Focus: Provides secure access to both internal and external resources like SaaS applications, websites, and private applications. -- Does: Secures access to the internet: This involves features like Secure Web Gateway (SWG) to filter malicious websites and block malware. (2) Protects SaaS and cloud apps: Cloud Access Security Broker (CASB) ensures safe access to cloud applications and prevents data leaks. (3) Secures remote access to private apps: Zero Trust Network Access (ZTNA) grants least-privilege access to internal applications without the need for VPNs, reducing the attack surface. -- Azure Tools (6): (1) Microsoft Entra is an IAM platform that brings the below tools together simplifying SSE implementation & management. (2) MS Defender for Cloud Apps: Acts as a CASB, providing visibility and control over cloud applications used by your organization. (3) Azure AD: Enables identity and access management for secure user authentication and authorization. (4) Azure Web Application Firewall (WAF): Protects web applications from common attacks. (5) Azure Private Access: Implements ZTNA principles for secure access to internal applications without public network exposure. (6) MS Defender for Endpoint: Delivers endpoint protection and threat detection on user devices.
Strategy (10 basic key components): A strategy document typically includes several key elements that outline the overall direction and priorities of an organization or project. Here are the main components:
Vision: A statement that describes the long-term aspirations and the future state that the organization or project aims to achieve. It provides a clear direction and inspires stakeholders.
Mission: A statement that defines the core purpose and focus of the organization or project. It explains why it exists and what it aims to accomplish.
Goals: Broad, long-term outcomes that the organization or project wants to achieve. Goals are aligned with the vision and mission and provide a framework for setting objectives.
Objectives: Specific, measurable, and time-bound steps that need to be taken to achieve the goals. Objectives are more detailed and actionable than goals.
Strategies: The approaches and methods that will be used to achieve the objectives. Strategies outline how resources will be allocated and what actions will be taken.
Tactics: Detailed plans and actions that will be implemented to execute the strategies. Tactics are the day-to-day activities and tasks that support the strategies.
Key Performance Indicators (KPIs): Metrics used to measure progress towards the objectives and goals. KPIs help in tracking performance and making data-driven decisions.
Risks and Mitigation: Identifying potential risks and challenges that may impact the achievement of goals and objectives, along with plans to mitigate these risks.
Resource Allocation: Detailing the resources required to implement the strategies, including personnel, budget, and tools.
Timeline: A schedule that outlines when different objectives, strategies, and tactics will be implemented and completed.
Tangential: Something that is only slightly or indirectly related to a topic or issue, often considered peripheral or not central to the main point.
TDD (Test-Driven Development). A software development approach where developers write tests before they write the actual code. -- EA perspective: Formalize a Reference-Logical Architecture flow to build the Physical Twin. -- Benefits: This helps ensure that the (Logical framework) and the code meet the specified requirements and functions correctly. The process involves writing a failing test, writing the minimum amount of code to pass the test, refactoring the code, and then repeating the process. -- Impact of EA & TDD: Helps improve (the Logical framework) code quality, maintainability, and overall efficiency in the development process.
Technical Capability Model (TCM). (1) A framework that identifies, defines, and organizes the technology-related abilities an organization possesses or needs to achieve its business goals. It provides a structured view of the IT landscape, focusing on what the technology can do rather than the specific technologies or systems used. (2) Think of it as a blueprint of the organization's technical proficiencies, categorized into logical groups. These capabilities are typically described in a product-agnostic way, meaning they focus on the function or service provided (e.g., "Data Analytics Services," "Customer Identity Management") rather than specific software or hardware vendors.
Technical Reference Model (TRM): -- BLUF: A TRM is a framework that provides a structured approach to understanding and managing the technology components within an organization. It serves as a blueprint for the technology infrastructure, helping to standardize and streamline the selection, implementation, and management of technology solutions. -- TRM includes, click here.
Thunderdome: Shifting DoD Cybersecurity to Zero Trust. [ZTA]
TIC (Trusted Internet Connection 3.0) by CISA.
-- BLUF: An initiative by CISA to enhance federal cybersecurity by consolidating network connections and improving visibility and security measures across federal networks.
-- TIC 3.0 expands on previous versions by incorporating modern security practices and technologies to secure a wide range of agency network architectures. -- TIC 3.0 Zero Trust Security Model refers to the integration of Zero Trust principles within the TIC 3.0 framework. Zero Trust is a security strategy that assumes no user or device is inherently trusted, whether inside or outside the network. Every access request is rigorously verified, and access is granted based on the principle of least privilege. The TIC 3.0 Zero Trust Security Model combines the comprehensive security measures of TIC 3.0 with the strict access control and continuous monitoring of Zero Trust
Topology. -- BLUF: The arrangement and interconnection of nodes (such as computers, switches, routers, etc.) within a network. -- Two types:
Physical Topology: This describes the physical layout of the network, including the physical connections between devices. Examples include bus, star, ring, mesh, tree, and hybrid topologies. -- Types of Network Toplopgies.
Logical Topology: This describes how data flows within the network, regardless of the physical layout. It focuses on the path that data takes between nodes and how devices communicate with each other
TRAINING.
CYBRARY: Has great training online.
DigitalDefynd: Offers a list of FREE training and certs.
PluralSight: FREE Trial, stuff like AI and cloud.
YouTube:
Transformation: -- BLUF: A significant, fundamental, and strategic change to an organization's operations, strategy, and culture. (1) Process Change: Redesigning business workflows to be more efficient. (2) Cultural Change: Fostering a new mindset, like encouraging teams to be more agile or data-driven. (3) Organizational Change: Restructuring teams and roles to support the new way of working.
Cloud Migration the act of simply "lifting and shifting" an existing application from an on-premise server to the cloud. The application itself and the way the business uses it may not change much.
Cloud Transformation, involves re-architecting applications and business processes to fully take advantage of the cloud's capabilities (e.g., using microservices, serverless computing, and advanced analytics). This is a true transformation because it fundamentally changes how the business operates, innovates, and serves its customers.
TRON (Transport Only Network, TIC 3.0). In the context of TIC 3.0, it refers to a network architecture designed to securely transport data without additional processing or storage within the network itself. This is a concept often used in secure communications to ensure data integrity and confidentiality. -- Purpose: Such networks are designed to minimize the risk of data interception or tampering by focusing solely on the transport layer, ensuring that data is transmitted securely from one point to another.
Trump, Donald. -- BLUF: He is an... -- [Criminal Cases: Politico].
Authoritarianism -- the enforcement or advocacy of strict obedience to authority.
He wants Retribution -- punishment inflicted on someone as vengeance.
He want to terminate the constitution.
He wants to be a dictator once elected.
Has taken and not returned highly sensitive national security documents, some at the TS/SCI level.
A Felon with 34 felony counts. -- New York Penal Law. In New York, falsifying business records is a misdemeanor. But it becomes a felony if the defendant falsified the records with the intent to commit or conceal a separate underlying crime.
Bad business man who is ordered to pay $350M ($450M w/ Interest) to NY because he Freudianly inflated and deflated valuations of his properties.
E. Jean Carroll (NPR). E. Jean Carroll accused Trump of sexually assaulting her in the '90s. Also, Carroll then sued Trump for defamation. A New York jury ordered Trump to pay a total of $83.3M to E. Jean Carroll for ruining her credibility.
UEBA (User and Entity Behavior Analytics). Valuable in Zero Trust. UEBA is a modern cybersecurity platform that uses analytics to detect anomalous behavior of users and entities (like devices or applications) on a network. It establishes a baseline of "normal" behavior and then identifies deviations that could indicate a security threat. -- Not in M-22-09 (Moving the U.S. Government Toward Zero Trust Cybersecurity Principles). -- Not in CISA ZTMM (but promotes Visibility and Analytics). -- Tools: (1) Azure Sentinel (SIEM-SecInfoEventMgmt and SOAR-Security Orchestration, Automation, and Response). (2) Zscaler.
Utilization. This term is often used to describe how data is used or leveraged within these contexts. For example, you might refer to "data utilization" in Power BI reports or "utilization of data models" in data science projects. This term emphasizes the practical application and effectiveness of data, which is a key aspect of both Power BI and data science. -- In Data Science: Utilization in data science involves the application of various techniques and models to analyze and interpret data. This includes using statistical methods, machine learning algorithms, and data visualization tools to extract meaningful patterns and insights from raw data. The goal is to utilize data to make predictions, identify trends, and support decision-making processes. For example, data scientists might utilize data to build predictive models that forecast future sales or to identify customer segments for targeted marketing campaigns. -- In Power BI: Utilization in Power BI refers to how data is transformed, analyzed, and visualized to provide actionable insights.
VLSI (Very-Large-Scale Integration). VLSI is the process of creating an integrated circuit by combining millions or billions of MOS transistors onto a single chip. Like SoC (System on Chip): A tiny computer built onto a single microchip.
VSL (Video Sales Letter) or Quick VSL: VSL or Quick VSL is an AI-powered platform designed to simplify the creation of professional-grade VSLs.
WRITING STYLES.
Analytical Writing -- (USAF Writing) Analytical writing dives deeper than simply telling a story. It's about examining a subject, issue, or text to understand its components and how they work together. Example: "I assess..."
Narrative Writing -- Narrative writing is all about telling a story. It can be fictional, completely made up, or non-fictional, based on true events. The key is that it follows a structure and uses elements to draw the reader in and make them feel invested in the characters and events unfolding.
WYSIWYG (What You See Is What You Get). WYSIWYG is a term used in computing to describe software that allows users to edit content and see exactly how it will appear in the final output, like a printed document, web page, or slide presentation.
ZTE (Zero Trust Edge): [Edge, ZTA] ZTE is a security approach that applies Zero Trust principles to network access and security, specifically at the edge of the network. Traditional network security relies on implicit trust within a defined perimeter, but ZTE assumes no user or device is inherently trustworthy and requires continuous verification. This approach aims to minimize the attack surface and provide granular access control across all users, devices, and applications, regardless of their location. -- ZTE Principles (3): (1) Least privilege access: Grant only the minimum access required for specific tasks. (2) Continuous verification: Continuously authenticate and authorize users and devices. (3) Data-centric security: Focus on protecting sensitive data wherever it resides. -- Azure tools (6): (1) Azure AD: Provides identity and access management, including multi-factor authentication and conditional access policies. (2) Azure VNet: Defines and isolates your network resources in the cloud. (3) Azure Firewall: Provides cloud-based network security services like firewalling, intrusion detection, and URL filtering. (4) Azure Sentinel (SIEM): Offers security information and event management (SIEM) capabilities for comprehensive threat detection and response. ( (6) Microsoft Defender for Cloud Apps: Protects cloud applications from unauthorized access and data breaches. (6) Azure Private Link: Enables secure connections between Azure resources and on-premises infrastructure or other Azure services without traversing the public internet. -- Other tools (2): (1) CrowdStrike Falcon: A ZT platform. Offers cloud-based security and identity management solutions for a zero-trust approach. (2) Zscaler: Enables secure access to cloud applications and prevents unauthorized data exfiltration. See Case Study - DOS...
Thorough understanding of Networking Architecture, Cloud Networking, and Network Automation
Thorough understanding of Data Center Software Defined Architecture
Thorough understanding of Collaboration Systems and Architecture
Thorough understanding of Security Frameworks and their applicable use cases
Additional Desired Skills:
Al/ML Understanding
Observability
Cloud Hyper-Scaler
https://recruiting.ultipro.com/PRE1019PRSD/JobBoard/4c05f321-903e-43d5-a4c0-5d9dd55dc34d/OpportunityDetail?opportunityId=e55e7791-ac55-4212-a77e-fd6e2b19a291