Sunday, May 19, 2019

Qualitative and Quantitative Research Methods

Focus on different methods of gathering data and material. Feedback the advantages and disadvantages. Choose the method that you will use in this project. Justify your choices

Qualitative Research Method
It is a type of research that collects non-numerical data and seeks to interpret the meaning of these data that helps us to understand it. The data can be collected through observation or interviews.

Advantages & Disadvantages:



Quantitative Research Method
A way of collecting and analyzing the data that is obtained from different sources. It involves the use of computational, statistical, and mathematical tools in order to get the information or data.

Advantages & Disadvantages:



For this project, I will choose the quantitative research method as the quantitative research method has a survey or questionnaire, as it is easier to know how many people that knows about the project's topic that is about AI, and they can also leave a comment or suggestion on how to improve the AI.


References:

ThoughtCo. (2019). What Is Qualitative Research?. [online] Available at: https://www.thoughtco.com/qualitative-research-methods-3026555 [Accessed 19 May 2019].


Mcleod, S. (2019). Qualitative vs Quantitative Research | Simply Psychology. [online] Simplypsychology.org. Available at: https://www.simplypsychology.org/qualitative-quantitative.html [Accessed 19 May 2019].


Sisinternational.com. (2019). What is Quantitative Research? | SIS International Research. [online] Available at: https://www.sisinternational.com/what-is-quantitative-research/ [Accessed 19 May 2019].


Monday, May 13, 2019

Security Tools and Techniques

Provide description
Discuss its purpose
Give the advantages (2) and disadvantages (2)
Explain why organizations need to implement it
Explain what will happen if it is not configured/set up properly

Demilitarized Zone
It is also called as a DMZ. It is a host or a network that is use to secure and intermediate network between the organization's internal and the external network. Also known as a network perimeter.

Purpose
To allow access to servers from the internet without having to access to the other corporate network

Advantages 

  • Increase the security of the LAN networks


Disadvantages


Network Address Translation
A process of changing the destination IP addresses and the source. The address translation reduces the need for IPv4 public addresses and hides the private network address range. This process is usually done by routers or firewalls

Purpose

Advantages 

Disadvantages

Firewalls
A software that is used to maintain the security of a private network. It block unauthorized access to or from a private network and often employed to prevent unauthorized web users from gaining access to private network that are connected to the internet.

Purpose
To block any unauthorized request from the client

Advantages 

  • Better security and network monitoring features
  • Allows for more advanced network functionality
  • Helps in VOIP phone reliability

Disadvantages

  • Cost and maintenance
  • Need for professionals to manage 
  • Can slow down the internet speeds

References

Techopedia.com. (2019). What is a Demilitarized Zone (DMZ)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/10266/demilitarized-zone-dmz [Accessed 8 May 2019].


Study-ccna.com. (2016). What is NAT?. [online] Available at: https://study-ccna.com/what-is-nat/ [Accessed 8 May 2019].


Techopedia.com. (2019). What is a Firewall? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/5355/firewall [Accessed 8 May 2019].


getthehelp. (2015). Advantage & Disadvantage of using DMZ. [online] Available at: https://getthehelp.wordpress.com/2015/09/08/advantage-disadvantage-of-using-dmz/ [Accessed 13 May 2019].


Firewall, 1. (2018). What are the Pros and Cons of Getting a Firewall - LME Services. [online] LME Services. Available at: https://www.lmeservices.com/pros-cons-getting-firewall/ [Accessed 13 May 2019].

Tuesday, May 7, 2019

IT Security

Explore a range of:

  • tools (2)
  • techniques (2) 
  • methods (2)

used for implementing network security

Tools
1. Aircrack

Enables to identify weak points in the wireless network's security. Can attempt to crack encryption password and test the capabilities of the WiFi cards and drivers



2. Solarwinds Network Performance Monitor

A solution that intend for use on large, mission-critical networks. This tools offers advanced network and device monitoring that can be instrumental in securing the network


Techniques
1. Network Scanning (Scan the network)

2. Firewall

3. Encryption



Methods
1. Access Control

Block any of unauthorized users and devices from accessing the network. Only users that are permitted to access the network

2. Anti-malware

Viruses can spread across the network and can damage the machine and the network. This anti-malware security effort should be able to prevent the damage from happening. 

References:


KisMAC. (2019). What is Network Security and How Can I Implement It?. [online] Available at: https://kismac-ng.org/network-security-tools/ [Accessed 2 May 2019].


Fruhlinger, J. (2019). What is network security? Definition, methods, jobs & salaries. [online] CSO Online. Available at: https://www.csoonline.com/article/3285651/what-is-network-security-definition-methods-jobs-and-salaries.html [Accessed 7 May 2019].

Tuesday, April 30, 2019

Security Vulnerability Test - Password Cracking

Describe the test and purpose of the test
It is the process to gain unauthorized access to restricted systems by using common passwords. In other words, this is to obtain the correct password which gives access to the system that is protected by an authentication method.

Discuss how it works
This is done by either guessing the password repeated usually through computer algorithm where the computer tries numerous combinations until the password is successfully discovered.

Provide example of the test

Discuss the solution if there is vulnerability after a test

  • Make a strong password that cannot be detect or guess by anyone 
  • Apply an auto-lock to the account if any of the attempt to unlock the system is incorrect
  • Make sure that every account has different password
  • Change your password frequently


Produce an audit document showing the range of tests on IT systems and networks (eg LANs/WANs and wireless networks)


References:

Techopedia.com. (2019). What is Password Cracking? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/4044/password-cracking [Accessed 25 Apr. 2019].


Guru99.com. (2019). How to Crack a Password. [online] Available at: https://www.guru99.com/how-to-crack-password-of-an-application.html [Accessed 30 Apr. 2019].


Infosec Resources. (2013). Password Auditing Explained. [online] Available at: https://resources.infosecinstitute.com/password-auditing/#gref [Accessed 30 Apr. 2019].


Friday, April 12, 2019

Method of Threat

Social Engineering:

Describe the method of threat  
It is a practice of using non-technical means, usually by communication through phones, which is to attack a target.

How it works?

  • By phone
They can pose as employees of the company or organization. They can ask questions to gain the trust of the person, this might include getting the confidential information
  • Phishing (most common technique on the internet)
Hacker can get data or information from the website where the user put their information 
  • Using attachments to email 
In this, malware is used to attack users address book and send emails with the file's attached to all of the user's contact

Provide example how it affect a system
When a hacker calls a company to pretends they are from the internal IT department and they will start asking the employee for sensitive information that can help them to gain access to the network.

Describe how to prevent such threat

  • Delete any request to personal information or passwords
Delete any request through email that asking for your personal information because no one should be contacting your personal information through email, this is a scam. 
  • Reject any requests for help or offers of help
This social engineers may request your help with your information or they might also offering to help you (as a technician). 
  • Set your spam filters to high
Email has a spam filter, so check your settings and set them to high in order to avoid risky messages coming into your inbox and dont forget to check them always because it is possible that any messages could be trapped from time to time.
  • Secure your devices
Install an antivirus software, firewalls and email filters and also set your automatic updates on and only access the secured websites 




References:

Wordfence. (2019). Understanding Social Engineering Techniques. [online] Available at: https://www.wordfence.com/learn/understanding-social-engineering-attacks/ [Accessed 12 Apr. 2019].


Maureen Data Systems. (2018). 5 Ways to Prevent Social Engineering Attacks. [online] Available at: https://www.mdsny.com/5-ways-to-prevent-social-engineering-attacks/ [Accessed 12 Apr. 2019].


Panda Security Mediacenter. (2014). How does social engineering work? - Panda Security Mediacenter. [online] Available at: https://www.pandasecurity.com/mediacenter/security/social-engineering/ [Accessed 17 Apr. 2019].

Project Management

Research Activity

1. Explain the project management
It is about the knowing of the goals, how to achieve them, and what are the resources that we need. The goals is to ensure that everyone are involved in a project and are aware of the purpose of the project.

2. Identify the key stages of project management
Initiation - implementing ideas and identifying the needs of the project, and it is where the research begin
Planning - setting up goals, outline the objectives of the project. 
Execution - the deliverable of the project is then develop and completed
Monitoring and evaluation - making sure that the project is meeting up with the project management plan
Closure - includes the important tasks to be check

3. Identify the advantages and the importance of implementing project management
Advantages:

  1. Improve the chances to achieve the desired result
  2. Set the schedule and budget accurately from the start
  3. Improve productivity and quality of work
Importance: 
  • Defines a plan and organizes chaos
Project can be a chaos and by organizing and planning the project will then can solve this chaos. Planning from the beginning to the end of the project can make sure the outcome will meet the goals of the project. 
  • Establishes a schedule and plan
A schedule is one of the key to a successful project, because without a schedule the project will not be done on time. 
  • Enforces and encourages teamwork
A project can bring people together in order to share ideas and also to provide inspiration. Collaboration can be the effective key in planning and management a project. 



References:

Paymo. (2019). What Is Project Management? Definition and Importance · Paymo Academy. [online] Available at: https://www.paymoapp.com/academy/what-is-project-management/ [Accessed 10 Apr. 2019].


Piston And Fusion. (2017). 5 KEY PHASES OF PROJECT MANAGEMENT. [online] Available at: http://www.pistonandfusion.org/blog/5-key-phases-of-project-management/ [Accessed 10 Apr. 2019].


nibusinessinfo.co.uk. (2012). Advantages of project management. [online] Available at: https://www.nibusinessinfo.co.uk/content/advantages-project-management [Accessed 12 Apr. 2019].


2020 Project Management. (2019). 10 Reasons why Project Management matters. [online] Available at: https://2020projectmanagement.com/resources/general-interest-and-miscellaneous/10-reasons-why-project-management-matters [Accessed 12 Apr. 2019].

Tuesday, June 12, 2018

LO2 Connectors and Cabling

Learning Outcome 2: Understand the key components used in networking

Connectors and cabling

  • Describe and identify the functions of the following:
  • Leased line
  • Dedicated line
  • Media types e.g STP, Category 5, Coaxial, UTP, fibre optic
  • Wireless
  • Mobile technology

Leased Line
  • It is a dedicated communication that connects two or more sites
  • Service contract between customer and provide
  • Acts as dedicated tunnel from one point to the others, data will flow continuously for a fixed monthly fee or rent
  • Are used for internet, telephone services and data
  • Run on fiber optic cables to provide large bandwidth 
Dedicated Line
  • In IT, this line is particular, fiber optic cable, twisted pair cable line, or other physical cable line, available anytime for a specific service
  • Also known as non-switched lines
Media Types
Stp
  • Shielded Twisted Pair
  • Special kind of copper telephone wire used in some business installations
  • An outer covering is added to the ordinary twisted pair telephone wires as a ground

Category 5
  • It is a type of cable used in Ethernet connections in local networks, and telephone and other data transmission
  • Employs a twisted pair design, instead of coaxial cable or fiber optic cable design

Coaxial Cable
  • Looks similar to the cable that are used in TV signal
  • Solid-core copper wire runs down the middle of the cable
  • Around the solid-core copper wire is the later of insulation, and braided wire and metal foil is the cover of the insulation which is shield from electromagnetic interference
  • Two types of coaxial cable is thinnet and thicknet
  • Thinnet is a flexible coaxial cable that is about 1/4 inch thick. Used for short distance
  • Thickent is thicker than thinnet and is about 1/2 inch thick and can support data transfer over long distance

UTP
  • Unshielded Twisted Pair
  • Most common type of network cabling
  • Consist of four twisted pair of wire with different number of twists per foot, encased on one sheat

Fibre Optic
  • Refers to the medium and technology associated with the transmission of information as light pulses along a glass strand
  • Can contain varying number of glass fibers from few up to a couple hundred
  • Surrounding the glass fiber core is another glass layer called cladding
  • A layer known as buffer tube protects the cladding and a jacket layer acts as the final protective layer for the individual strand

Wireless
  • Describe numerous communication technologies that rely on wireless signal to send data than using physical medium
  • In wireless transmission, the medium used in the air through electromagnetic, radio and microwave signals
  • The word communication refers also to the communication between devices and other technologies
Mobile Technology
  • Can travel with its user or with a piece of equipment, providing data from any geographical location
  • Can virtually connect any number of parties by hosting communication and collaboration through mobile devices 
References:

Techopedia.com. (2018). What is a Leased Line? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/5595/leased-line [Accessed 13 Jun. 2018].


Techopedia.com. (2018). What is a Dedicated Line? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/14119/dedicated-line [Accessed 13 Jun. 2018].


Techopedia.com. (2018). What is a Dedicated Line? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/14119/dedicated-line [Accessed 13 Jun. 2018].


Omnisecu.com. (2018). Coaxial cables, Twisted Pair STP and UTP cables, Twisted Pair Cable Categories (CAT). [online] Available at: http://www.omnisecu.com/basic-networking/common-network-cable-types.php [Accessed 13 Jun. 2018].


Techwalla. (2018). Types of Media Used in Computer Networking | Techwalla.com. [online] Available at: https://www.techwalla.com/articles/types-of-media-used-in-computer-networking [Accessed 13 Jun. 2018].


SearchNetworking. (2018). What is shielded twisted pair? - Definition from WhatIs.com. [online] Available at: https://searchnetworking.techtarget.com/definition/shielded-twisted-pair [Accessed 13 Jun. 2018].


SearchTelecom. (2018). What is fiber optics (optical fiber)? - Definition from WhatIs.com. [online] Available at: https://searchtelecom.techtarget.com/definition/optical-fiber [Accessed 13 Jun. 2018].


Techopedia.com. (2018). What is Wireless? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/2993/wireless [Accessed 13 Jun. 2018].


Falk, S. (2017). What is Mobile Technology and What Does it Mean for the Construction Industry?. [online] eSUB Construction Software. Available at: https://esub.com/what-is-mobile-technology-and-what-does-it-mean-for-the-construction-industry/ [Accessed 13 Jun. 2018].


Techopedia.com. (2018). What is a Category 5 Cable (Cat5 Cable)? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/23270/category-5-cable-cat5-cable [Accessed 13 Jun. 2018].

CRP - Key Considerations for Research

Determine the key considerations are for planning and undertaking research Issues that can be encountered in research  poor time mana...