Monday, 4 November 2019

Network Security-Proof of Concept




  • How to design s secured network (methods) 
Step 1. Identify what step should be done
Step 2. Start planning the design
Step 3. Use and set Anti-Virus/Anti-Malware Software
Step 4. Set Up a Firewall
Step 5. Invest in a VPN
Step 6. Secure Your Router
Step 7. Update Router Information Periodically
Step 8. Update the Name of Your Network
Step 9. Use a Private IP Address





  • The different type of network security designs that will aid good network security
-IPS
It is Intrusion Prevention System.This is when you control who can and can’t access your network. 
-identify suspicious activity

-Firewall
It is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

-protect computer and prevent unauthorized access

-VPN

It stand for Virtual Private Network.A connection method used to add security and privacy to private and public networks like WiFi hotspot and the internet.
-secure connection to another network over the internet

-Proxy Server

It is a computer that acts as a gateway between a local network and large scale network such as the internet.
-prevent attacker from invading a private network




References:

Monday, 28 October 2019

Network Security-Protocols

  • Choose FOUR(4) protocols and discuss its details and importance in network security.Research how they aid network security.

  • POP3
-It stands for Post Office Protocol
-Allow you to download email message on your local computer 
-Emails are stored on the server
-Sent messages are stored on the server
-Message can be synced and accessed across multiple devices


Importance:
-It use to build a communication channel between an email client and server.


How?
-When a user checks for new email,the client will connect to the POP3 server.The email client then supplies its username and password to the server for authentication.


Image result for POP3



  • DHCP

-It stand for Dynamic Host Configuration Protocol
-It is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.
-DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints.


Importance:
-DHCP server dynamically assigns an IP address and other network configuration parameters to each devices on a network so they can communicate with other IP networks.




Image result for DHCP



  • IMAP
-It stands for Internet Messaging Access Protocol
-It is an internet standard that describes a protocol for retrieving messages from an email server
-When you read an email message ,you aren't actually downloading or storing it on your computer;instead you're reading it from email service.

Importance:
-It allow users to sync emails between multiple devices.

Image result for IMAP



  • IPSEC

-IPsec stand for Internet Protocol Security
-It is a suite of protocols that secure network communication across IP networks. 
-It provides security services for IP network traffic such as encrypting sensitive data, authentication, protection against replay and data confidentiality.

Importance:
-The data sent over the internet and private networks includes passwords.


How?

-It provide security for routers sending routing  data across the public internet.





Wednesday, 23 October 2019

Business Intelligence


  • Analyse and compare the system and technologies associated with business intelligence.For example:
Data warehouses
-A system used for storing and reporting on data.
-The data typically originates in multiple systems,then it is moved into the data warehouse for long-term storage and analysis.
-This storage is structure such that users from many decisions or departments within an organization can access and analyze the data according to their needs.







Executive Information Systems
-A type of management information system intended to facilitate and support the information and decision making need of senior executives by providing easy access to both internal and external information relevant to meeting the strategic goals of the organization.





Online Analytical Processing (OLAP)
-It is a category of software that allow users to analyze information from multiple database systems at the same time.
-A technology that enables analysts to extract and view business data from different points of view.












Tuesday, 15 October 2019

Network Security-Example of Network Security Breaches

Example of Network Security Breaches




  • Instagram
  • Last August, the platform saw a group of Russian hackers take control of hundreds of accounts.
  • The hackers changed profile information and contact email addresses for purposes that are still not entirely clear.
  • A third-party attack on influencer services contractor Chatrbox exposed the personal information of 49 million Instagram personalities, while a mysterious unsecured Amazon S3 database owned by an unknown United Kingdom company was found that contained private user information for 14 million more accounts. That makes this the third serious Instagram data leak within a year.



Activity-Business Intelligence


  • Produce an I/O for the following scenario:
-Enrolling HND in Micronet
  • Data Input: name,age,contact number,address
  • Data Capture: HND course,gender,status
  • Data process:
Collection: collecting how many student in the micronet 
Communication: orientation day with the students


-Creating an Email
  • Data Input: first name,last name,email name,password
  • Data Capture : gender,country,dob
  • Data process:
Collection
Storage

-Registering on Facebook
  • Data Input: first name,last name,email or address,gender
  • Data Capture : dob,country
  • Data process:
Collection: 
Storage:
Communication:chat with people in the facebook



Wednesday, 9 October 2019

Business Intelligence

Write the process of registering to MIC for HND.

Write the process of buying and owning a car in Brunei.





Write the process of opening a bank account.























Tuesday, 8 October 2019

Activity-Network Security-Different type of hacker


  • Research one type of hacker and provide its description.

Hacktivist
-It is a hacker or group of anonymous hacker who gain unauthorized access to government's computer files and networks for further social and political ends.

For example,Instagram.





  • Find one person who is known for that type of hacker and briefly give its details.

-Aaron Swartz,American hacktivist
-Arrested in 6 January 2011
-Cause? Breaking and entering charges due to installing a computer. Downloading an academic journal articles from an Institute.