Sunday, May 19, 2019

Qualitative and Quantitative Research Methods

Focus on different methods of gathering data and material. Feedback the advantages and disadvantages. Choose the method that you will use in this project. Justify your choices

Qualitative Research Method
It is a type of research that collects non-numerical data and seeks to interpret the meaning of these data that helps us to understand it. The data can be collected through observation or interviews.

Advantages & Disadvantages:



Quantitative Research Method
A way of collecting and analyzing the data that is obtained from different sources. It involves the use of computational, statistical, and mathematical tools in order to get the information or data.

Advantages & Disadvantages:



For this project, I will choose the quantitative research method as the quantitative research method has a survey or questionnaire, as it is easier to know how many people that knows about the project's topic that is about AI, and they can also leave a comment or suggestion on how to improve the AI.


References:

ThoughtCo. (2019). What Is Qualitative Research?. [online] Available at: https://www.thoughtco.com/qualitative-research-methods-3026555 [Accessed 19 May 2019].


Mcleod, S. (2019). Qualitative vs Quantitative Research | Simply Psychology. [online] Simplypsychology.org. Available at: https://www.simplypsychology.org/qualitative-quantitative.html [Accessed 19 May 2019].


Sisinternational.com. (2019). What is Quantitative Research? | SIS International Research. [online] Available at: https://www.sisinternational.com/what-is-quantitative-research/ [Accessed 19 May 2019].


Monday, May 13, 2019

Security Tools and Techniques

Provide description
Discuss its purpose
Give the advantages (2) and disadvantages (2)
Explain why organizations need to implement it
Explain what will happen if it is not configured/set up properly

Demilitarized Zone
It is also called as a DMZ. It is a host or a network that is use to secure and intermediate network between the organization's internal and the external network. Also known as a network perimeter.

Purpose
To allow access to servers from the internet without having to access to the other corporate network

Advantages 

  • Increase the security of the LAN networks


Disadvantages


Network Address Translation
A process of changing the destination IP addresses and the source. The address translation reduces the need for IPv4 public addresses and hides the private network address range. This process is usually done by routers or firewalls

Purpose

Advantages 

Disadvantages

Firewalls
A software that is used to maintain the security of a private network. It block unauthorized access to or from a private network and often employed to prevent unauthorized web users from gaining access to private network that are connected to the internet.

Purpose
To block any unauthorized request from the client

Advantages 

  • Better security and network monitoring features
  • Allows for more advanced network functionality
  • Helps in VOIP phone reliability

Disadvantages

  • Cost and maintenance
  • Need for professionals to manage 
  • Can slow down the internet speeds

References

Techopedia.com. (2019). What is a Demilitarized Zone (DMZ)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/10266/demilitarized-zone-dmz [Accessed 8 May 2019].


Study-ccna.com. (2016). What is NAT?. [online] Available at: https://study-ccna.com/what-is-nat/ [Accessed 8 May 2019].


Techopedia.com. (2019). What is a Firewall? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/5355/firewall [Accessed 8 May 2019].


getthehelp. (2015). Advantage & Disadvantage of using DMZ. [online] Available at: https://getthehelp.wordpress.com/2015/09/08/advantage-disadvantage-of-using-dmz/ [Accessed 13 May 2019].


Firewall, 1. (2018). What are the Pros and Cons of Getting a Firewall - LME Services. [online] LME Services. Available at: https://www.lmeservices.com/pros-cons-getting-firewall/ [Accessed 13 May 2019].

Tuesday, May 7, 2019

IT Security

Explore a range of:

  • tools (2)
  • techniques (2) 
  • methods (2)

used for implementing network security

Tools
1. Aircrack

Enables to identify weak points in the wireless network's security. Can attempt to crack encryption password and test the capabilities of the WiFi cards and drivers



2. Solarwinds Network Performance Monitor

A solution that intend for use on large, mission-critical networks. This tools offers advanced network and device monitoring that can be instrumental in securing the network


Techniques
1. Network Scanning (Scan the network)

2. Firewall

3. Encryption



Methods
1. Access Control

Block any of unauthorized users and devices from accessing the network. Only users that are permitted to access the network

2. Anti-malware

Viruses can spread across the network and can damage the machine and the network. This anti-malware security effort should be able to prevent the damage from happening. 

References:


KisMAC. (2019). What is Network Security and How Can I Implement It?. [online] Available at: https://kismac-ng.org/network-security-tools/ [Accessed 2 May 2019].


Fruhlinger, J. (2019). What is network security? Definition, methods, jobs & salaries. [online] CSO Online. Available at: https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-and-salaries.html [Accessed 7 May 2019].

CRP - Key Considerations for Research

Determine the key considerations are for planning and undertaking research Issues that can be encountered in research  poor time mana...