Monday, 4 November 2019

Network Security-Proof of Concept




  • How to design s secured network (methods) 
Step 1. Identify what step should be done
Step 2. Start planning the design
Step 3. Use and set Anti-Virus/Anti-Malware Software
Step 4. Set Up a Firewall
Step 5. Invest in a VPN
Step 6. Secure Your Router
Step 7. Update Router Information Periodically
Step 8. Update the Name of Your Network
Step 9. Use a Private IP Address





  • The different type of network security designs that will aid good network security
-IPS
It is Intrusion Prevention System.This is when you control who can and can’t access your network. 
-identify suspicious activity

-Firewall
It is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

-protect computer and prevent unauthorized access

-VPN

It stand for Virtual Private Network.A connection method used to add security and privacy to private and public networks like WiFi hotspot and the internet.
-secure connection to another network over the internet

-Proxy Server

It is a computer that acts as a gateway between a local network and large scale network such as the internet.
-prevent attacker from invading a private network




References:

Monday, 28 October 2019

Network Security-Protocols

  • Choose FOUR(4) protocols and discuss its details and importance in network security.Research how they aid network security.

  • POP3
-It stands for Post Office Protocol
-Allow you to download email message on your local computer 
-Emails are stored on the server
-Sent messages are stored on the server
-Message can be synced and accessed across multiple devices


Importance:
-It use to build a communication channel between an email client and server.


How?
-When a user checks for new email,the client will connect to the POP3 server.The email client then supplies its username and password to the server for authentication.


Image result for POP3



  • DHCP

-It stand for Dynamic Host Configuration Protocol
-It is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.
-DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints.


Importance:
-DHCP server dynamically assigns an IP address and other network configuration parameters to each devices on a network so they can communicate with other IP networks.




Image result for DHCP



  • IMAP
-It stands for Internet Messaging Access Protocol
-It is an internet standard that describes a protocol for retrieving messages from an email server
-When you read an email message ,you aren't actually downloading or storing it on your computer;instead you're reading it from email service.

Importance:
-It allow users to sync emails between multiple devices.

Image result for IMAP



  • IPSEC

-IPsec stand for Internet Protocol Security
-It is a suite of protocols that secure network communication across IP networks. 
-It provides security services for IP network traffic such as encrypting sensitive data, authentication, protection against replay and data confidentiality.

Importance:
-The data sent over the internet and private networks includes passwords.


How?

-It provide security for routers sending routing  data across the public internet.





Wednesday, 23 October 2019

Business Intelligence


  • Analyse and compare the system and technologies associated with business intelligence.For example:
Data warehouses
-A system used for storing and reporting on data.
-The data typically originates in multiple systems,then it is moved into the data warehouse for long-term storage and analysis.
-This storage is structure such that users from many decisions or departments within an organization can access and analyze the data according to their needs.







Executive Information Systems
-A type of management information system intended to facilitate and support the information and decision making need of senior executives by providing easy access to both internal and external information relevant to meeting the strategic goals of the organization.





Online Analytical Processing (OLAP)
-It is a category of software that allow users to analyze information from multiple database systems at the same time.
-A technology that enables analysts to extract and view business data from different points of view.












Tuesday, 15 October 2019

Network Security-Example of Network Security Breaches

Example of Network Security Breaches




  • Instagram
  • Last August, the platform saw a group of Russian hackers take control of hundreds of accounts.
  • The hackers changed profile information and contact email addresses for purposes that are still not entirely clear.
  • A third-party attack on influencer services contractor Chatrbox exposed the personal information of 49 million Instagram personalities, while a mysterious unsecured Amazon S3 database owned by an unknown United Kingdom company was found that contained private user information for 14 million more accounts. That makes this the third serious Instagram data leak within a year.



Activity-Business Intelligence


  • Produce an I/O for the following scenario:
-Enrolling HND in Micronet
  • Data Input: name,age,contact number,address
  • Data Capture: HND course,gender,status
  • Data process:
Collection: collecting how many student in the micronet 
Communication: orientation day with the students


-Creating an Email
  • Data Input: first name,last name,email name,password
  • Data Capture : gender,country,dob
  • Data process:
Collection
Storage

-Registering on Facebook
  • Data Input: first name,last name,email or address,gender
  • Data Capture : dob,country
  • Data process:
Collection: 
Storage:
Communication:chat with people in the facebook



Wednesday, 9 October 2019

Business Intelligence

Write the process of registering to MIC for HND.

Write the process of buying and owning a car in Brunei.





Write the process of opening a bank account.























Tuesday, 8 October 2019

Activity-Network Security-Different type of hacker


  • Research one type of hacker and provide its description.

Hacktivist
-It is a hacker or group of anonymous hacker who gain unauthorized access to government's computer files and networks for further social and political ends.

For example,Instagram.





  • Find one person who is known for that type of hacker and briefly give its details.

-Aaron Swartz,American hacktivist
-Arrested in 6 January 2011
-Cause? Breaking and entering charges due to installing a computer. Downloading an academic journal articles from an Institute.




























Monday, 7 October 2019

Activity-Network Security-Breaches


  • Two (2) examples of breaches. 
DDOS
-DDOS stands for distributed denial of service.
-It is a malicious attempt to make a server or a network resource unavailable to users, actually by temporarily interrupting or suspending the service of a host connected to the internet.


  • What happens it occurs.
-It will attempt to make an online service or website unavailable by flooding it with unwanted traffic from multiple computers.
-An attacker will spread malicious software to vulnerable computers.



  • How to prevent it?
-Install protection tools
-Keep everything up to date




Phishing
-It is a way that criminals steal confidential information such as facebook.

  • What happens it occurs.
-It happens when someone on the web pretends to be someone they're not trick you into providing confidential information.



  • How to prevent it?
-Always check the website you are visiting is secure.
-Use anti-spam software 
-Use firewall
-Keep your computer secure


LO1 Activity-Network Security


  • What is Network Security?
It is designed to protect your network and its data from multiple layers of breaches and intrusions with hardware and software solutions. It also a process of strategizing a defensive approach to secure data and resources over the computer network infrastructure against any potential threat or unauthorized access.


  • Advantages and Disadvantages of Network Security.
Advantage:
-To keep your computer from getting viruses or hacked
-To prevent cyber attacks
-Securing confidential information
-To deny program from certain resources that could be infected

Disadvantage:
-Firewall can be difficult to configure correctly
-Incorrectly configured firewalls may block users from performing certain actions on the Internet
-It makes the system slower than before
-Need to keep updating the new software in order to keep security up to date

  • The importance of Network Security.
-It helps to protect your workstations from harmful spyware and to ensure that shared data is kept secure.
-A good network security system helps businesses reduce the risk of falling victim of data theft and sabotage.


Sunday, 6 October 2019

LO1 Exercise-Business Intelligence


  • Explain Business Intelligence and its purpose.
-It refer to the procedural and techniqal infrastructure that collects,store and analyze the data produced by a company's activity.
-It is a combination of related activities that include querying,data mining,reporting and online analytical processing.

-The purpose is to support better business decision making.
-Hence,to assist business executives,managers and workers to come up with innovative business ideas and make more informed choices about the direction their company should take.

  • Discuss "Business Process" with example.
It is a series of repeatable steps taken by a team or company to achieve some sort of business goal such as managing deliveries,assembling products and onboarding employees.





  • Identify and describe the business process model.
-It is the graphical representation of a company's business processes or workflows which means identifying potential improvements.
-It actually done through different graphing methods such as flowchart and data flow diagram.

Below is the example of business process model such as flowchart.














Tuesday, 14 May 2019

Research activity-Qualitative and Quantitative Research Method


  • Focus on different methods of gathering data and material.Feedback the advantages and disadvantages.
  • Choose the method that you will use in your project.Justify your choices.

Monday, 13 May 2019

Research activity-Tools and techniques



For each of the tools:
·         Provide the description
·         Discuss its purpose
·         Give the advantages (2) and disadvantages (2)
·         Explain why organizations need to implement it
·         Explain what will happen if it is not configured/set up properly

Monday, 29 April 2019

MSCP



Project management plan is the process of combining system, techniques and people to complete a project within established goals of time, budget and quality. Hence, to make sure that the project has quality.

The importance of having project management plan is to make sure the planning is going well. Where planning project need to do by step by step to do for each task.Morever, to keep track of what we are doing for the project.


Project Scope
Project scope means the range of the project that you handle is big or small. It is initial phase of the project planning process. It typically involves drawing up a list of everything needed to create the framework of the project. 

Project scope is important because it will help you to ensure clear project goals and objectives and it helps everyone to stay on the same page throughout the life cycle of the project.

Project Cost

It is the processes that involved in planning, estimating, budgeting and controlling costs so that the project can be completed within the approved budget.

Project cost is important because to know how much budget that have been spend and to manage project cost effectively.

Project Quality

It is the process that is required to ensure that the project satisfies the needs for which it is undertaken.
     Project Risk
A risk is any factor that may potentially interfere with successful completion of the project. It is an uncertainty
that can have a negative or positive effect on meeting project objectives.Project risk is important because it help to improve project success by helping select good projects.

     Project Time
    It refers to a component of overall project management in which a timeline is analyzed and developed for the completion of a project or deliverable.

Wednesday, 24 April 2019

Security Vulnerability-Virus detection

Choose ONE(1) security vulnerability test.

Describe the test and purpose of the test.
Virus known as anti-malware software.The purpose of virus detection is to  remove viruses and other unwanted programs (malware) from your computer such as virus,worms and Trojan.

There are some symptom of virus such as computer run slower than normal,show popups both online or offline,it have programs that do not open,run slow or close unexpectedly,it have browser that do not display some or any website at all,present problems when trying to recognize external hardware and it show a blue screen with the error code.

How it works?
Antivirus software will begin by checking your computer programs and comparing them to known types of malware. It will also scan your computer for behaviors that may signal the presence of a new, unknown malware. Typically, antivirus software uses all three scanning detection processes:
  • Specific Detection – This works by looking for known malware by a specific set of characteristics.
  • Generic Detection – This process looks for malware that are variants of known “families,” or malware related by a common codebase.
  • Heuristic Detection This process scans for previously unknown viruses by looking for known suspicious behavior or file structures.
Provide example of the test.


  • Discuss the solution if there is vulnerability after a test.
  • Produce an audit document showing the range of tests on IT systems and networks example (LAN's/WANs and wireless networks)


Sunday, 14 April 2019

Activity : Website

Project Name: Zalora Online Shopping Website



Team member:
Norros
Mizah
Najibah
Azeez
Muiz


1)Initiation
-To expose Zalora in world wide Asia.
-To get more income by having an online website.
-To make it easier for customer to purchase the product through online.
-Saving time instead of going to the store.

2)Planning
-Schedule
  Start date : 15/4/2019
  End date : 19/5/2019

-Budget
  $10,000

-Resources
 Computer,software,materials,team members,domain name

3)Execution
-Designing (Azeez)
-Advertisement (Norros)
-Marketing (Mizah)
-Developer (Muiz)
-Project Management (Najibah)

4)Monitor and Controlling
-(15/4-21/4)  Project Management
-(22/4-28/4) Project Marketing
-(29/4-5/5) Project Designing
-(6/5-12/5) Project Developer
-(13/5-19/5) Project Advertising

5)Closing
-Checking the error of the code/website
-Time management
-Our team members manage to complete each tasks within the project timeline


Wednesday, 10 April 2019

Research activity-Security

Choose ONE (1) method of threat:(IP spoofing)

  • Describe the method of threat. 
IP spoofing is a technique used to gain unauthorized access to machine,whereby an attacker illicitly impersonates another machine by manipulating IP packets.

  • How it works?
The data transmitted over the internet is first broken into multiple packets, and those packets are transmitted independently and reassembled at the end.

Each packet has an IP (Internet Protocol) header that contains information about the packet, including the source IP address and the destination IP address.


  • Example

How to prevent ?
  • Stay secure when using the web
  • Install a spoofing detector

References:

Tuesday, 9 April 2019

Research activity-Project Management


  • Explain project management
It is an application of knowledge,skills,tools and techniques to project activities in order to meet stakeholder needs and expectations from a project.

  • Identify the key stages of project management
1)Initiate
In this first phase, you'll develop a project overview, map out your project management approach, and pick a project manager. The latter, in turn, will select a team and start the planning process. You'll create a project charter at this stage.



2)Plan

In the second phase, you (the project manager) will develop a roadmap for the project team. You'll set goals, define the scope, create a work breakdown schedule (WBS), identify milestones, and develop communication and risk management plans.



3)Execute

This phase involves developing a team and assigning tasks, holding meetings, and setting up tracking systems. Much of the actual work of the project happens in this phase.



4)Control

This phase happens alongside the Execution phase and involves monitoring the team performance and managing its output quality. You'll track deliverables, project costs, and the performance of individual team members and the project as a whole.



5)Close

In the fifth phase, deliverables are handed over to stakeholders and the project is brought to a formal close. You'll review your team's performance and recognize their effort. You'll also analyze the project for flaws and take notes to improve future performance.





  • Identify the advantages and the importance of implementing project management
Advantages:

  • Implement a standard approach to managing projects
  • Manage the project pipeline more efficiently
  • Optimize resource allocation
  • Centralize project reporting
  • Improve task management and visibility
  • Effective team collaboration



Importance:




1)Strategic Alignment

It ensures what is being delivered, is right, and will deliver real value against the business opportunity.



2)Leadership

It brings leadership and direction to projects.



3)Clear focus and objectives


It ensures there’s a proper plan for executing on strategic goals.


4)Realistic project planning 

It ensures proper expectations are set around what can be delivered, by when, and for how much.




References:

Monday, 7 January 2019

Ayamku_WebsiteDesign

LO3 Exercise

Design a website (online store) for any company that you choose.


  • Describe the purpose of the website and the target audience.
Purpose of the website:
-To promote the Ayamku restaurant to the world wide 
-To expand more income
- Gain more customer
-To tell the customer that our food taste are different with a mixture of natural ingredients than other    restaurant

Target audience:
-21 years old above

  • Identify the user and client requirements
User:
-Easy to check the menu
-Font size
-Order delivery
-Appropriate image
-Able to read


Client:
-Simple website
-Easy to read and easy to see
-Appropriate background color
-Colour of the food that attract customer
-Provide order delivery service


  • Create a sitemap




  • Create a wireframe for Login,register,index,contact us products page(general),and about us page.
Home Page

Product Page


Order Page




Login/Register Page






Contact Us Page