Monday, 28 October 2019

Network Security-Protocols

  • Choose FOUR(4) protocols and discuss its details and importance in network security.Research how they aid network security.

  • POP3
-It stands for Post Office Protocol
-Allow you to download email message on your local computer 
-Emails are stored on the server
-Sent messages are stored on the server
-Message can be synced and accessed across multiple devices


Importance:
-It use to build a communication channel between an email client and server.


How?
-When a user checks for new email,the client will connect to the POP3 server.The email client then supplies its username and password to the server for authentication.


Image result for POP3



  • DHCP

-It stand for Dynamic Host Configuration Protocol
-It is a client/server protocol that automatically provides an Internet Protocol (IP) host with its IP address and other related configuration information such as the subnet mask and default gateway.
-DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints.


Importance:
-DHCP server dynamically assigns an IP address and other network configuration parameters to each devices on a network so they can communicate with other IP networks.




Image result for DHCP



  • IMAP
-It stands for Internet Messaging Access Protocol
-It is an internet standard that describes a protocol for retrieving messages from an email server
-When you read an email message ,you aren't actually downloading or storing it on your computer;instead you're reading it from email service.

Importance:
-It allow users to sync emails between multiple devices.

Image result for IMAP



  • IPSEC

-IPsec stand for Internet Protocol Security
-It is a suite of protocols that secure network communication across IP networks. 
-It provides security services for IP network traffic such as encrypting sensitive data, authentication, protection against replay and data confidentiality.

Importance:
-The data sent over the internet and private networks includes passwords.


How?

-It provide security for routers sending routing  data across the public internet.





Wednesday, 23 October 2019

Business Intelligence


  • Analyse and compare the system and technologies associated with business intelligence.For example:
Data warehouses
-A system used for storing and reporting on data.
-The data typically originates in multiple systems,then it is moved into the data warehouse for long-term storage and analysis.
-This storage is structure such that users from many decisions or departments within an organization can access and analyze the data according to their needs.







Executive Information Systems
-A type of management information system intended to facilitate and support the information and decision making need of senior executives by providing easy access to both internal and external information relevant to meeting the strategic goals of the organization.





Online Analytical Processing (OLAP)
-It is a category of software that allow users to analyze information from multiple database systems at the same time.
-A technology that enables analysts to extract and view business data from different points of view.












Tuesday, 15 October 2019

Network Security-Example of Network Security Breaches

Example of Network Security Breaches




  • Instagram
  • Last August, the platform saw a group of Russian hackers take control of hundreds of accounts.
  • The hackers changed profile information and contact email addresses for purposes that are still not entirely clear.
  • A third-party attack on influencer services contractor Chatrbox exposed the personal information of 49 million Instagram personalities, while a mysterious unsecured Amazon S3 database owned by an unknown United Kingdom company was found that contained private user information for 14 million more accounts. That makes this the third serious Instagram data leak within a year.



Activity-Business Intelligence


  • Produce an I/O for the following scenario:
-Enrolling HND in Micronet
  • Data Input: name,age,contact number,address
  • Data Capture: HND course,gender,status
  • Data process:
Collection: collecting how many student in the micronet 
Communication: orientation day with the students


-Creating an Email
  • Data Input: first name,last name,email name,password
  • Data Capture : gender,country,dob
  • Data process:
Collection
Storage

-Registering on Facebook
  • Data Input: first name,last name,email or address,gender
  • Data Capture : dob,country
  • Data process:
Collection: 
Storage:
Communication:chat with people in the facebook



Wednesday, 9 October 2019

Business Intelligence

Write the process of registering to MIC for HND.

Write the process of buying and owning a car in Brunei.





Write the process of opening a bank account.























Tuesday, 8 October 2019

Activity-Network Security-Different type of hacker


  • Research one type of hacker and provide its description.

Hacktivist
-It is a hacker or group of anonymous hacker who gain unauthorized access to government's computer files and networks for further social and political ends.

For example,Instagram.





  • Find one person who is known for that type of hacker and briefly give its details.

-Aaron Swartz,American hacktivist
-Arrested in 6 January 2011
-Cause? Breaking and entering charges due to installing a computer. Downloading an academic journal articles from an Institute.




























Monday, 7 October 2019

Activity-Network Security-Breaches


  • Two (2) examples of breaches. 
DDOS
-DDOS stands for distributed denial of service.
-It is a malicious attempt to make a server or a network resource unavailable to users, actually by temporarily interrupting or suspending the service of a host connected to the internet.


  • What happens it occurs.
-It will attempt to make an online service or website unavailable by flooding it with unwanted traffic from multiple computers.
-An attacker will spread malicious software to vulnerable computers.



  • How to prevent it?
-Install protection tools
-Keep everything up to date




Phishing
-It is a way that criminals steal confidential information such as facebook.

  • What happens it occurs.
-It happens when someone on the web pretends to be someone they're not trick you into providing confidential information.



  • How to prevent it?
-Always check the website you are visiting is secure.
-Use anti-spam software 
-Use firewall
-Keep your computer secure


LO1 Activity-Network Security


  • What is Network Security?
It is designed to protect your network and its data from multiple layers of breaches and intrusions with hardware and software solutions. It also a process of strategizing a defensive approach to secure data and resources over the computer network infrastructure against any potential threat or unauthorized access.


  • Advantages and Disadvantages of Network Security.
Advantage:
-To keep your computer from getting viruses or hacked
-To prevent cyber attacks
-Securing confidential information
-To deny program from certain resources that could be infected

Disadvantage:
-Firewall can be difficult to configure correctly
-Incorrectly configured firewalls may block users from performing certain actions on the Internet
-It makes the system slower than before
-Need to keep updating the new software in order to keep security up to date

  • The importance of Network Security.
-It helps to protect your workstations from harmful spyware and to ensure that shared data is kept secure.
-A good network security system helps businesses reduce the risk of falling victim of data theft and sabotage.


Sunday, 6 October 2019

LO1 Exercise-Business Intelligence


  • Explain Business Intelligence and its purpose.
-It refer to the procedural and techniqal infrastructure that collects,store and analyze the data produced by a company's activity.
-It is a combination of related activities that include querying,data mining,reporting and online analytical processing.

-The purpose is to support better business decision making.
-Hence,to assist business executives,managers and workers to come up with innovative business ideas and make more informed choices about the direction their company should take.

  • Discuss "Business Process" with example.
It is a series of repeatable steps taken by a team or company to achieve some sort of business goal such as managing deliveries,assembling products and onboarding employees.





  • Identify and describe the business process model.
-It is the graphical representation of a company's business processes or workflows which means identifying potential improvements.
-It actually done through different graphing methods such as flowchart and data flow diagram.

Below is the example of business process model such as flowchart.