Posts

Showing posts from 2019

Network security design

Image
Ground floor Firewall - Monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules. Email security -    Used to secure the access and content of service and email account VPN router - Secure your internet connection IPS IDS NAC

Network planning - Proof of concept

How to design a secured network (methods, the steps) The different types of network security design that will aid good network security 1. Identify the assets such as hardware, software, employee 2. Identify the budget of the company 3. Analyze security risk with the solution (virus- install anti virus) 4. Analyze security requirements 5. List down all the software that can be installed in the network 6. List all the asset (Security hardware for example VPN, firewall, antivirus, DMZ) 7. Identify the secure connection (cable or wire) 8. Design or sketch a network 9. Ask other colleague or approval by the organization or the client An organizations need to update their system frequently, because hackers are discovering new flaws in security network and coming out with new methods to gains access to unauthorized networks. 1.     Network access control -        It is for controlling which users can access you network -        Identifying which users and devices a

Network security protocols & technologies

FTP Stands for file transfer protocol Used for transferring files between a computer on the internet by TCP/IP connection How it works FTP works by two communications between server and a client. A command channel is controlling the communication and data channel for transferring the files. By using the FTP, a client can delete, download, copy, rename and upload file on the server. File transfer protocol (FTP) is important in a network security is because it can secure and ensure file transfer safe. IPsec Stands for Internet Protocol security and also known as IP security Set of protocols security for internet protocol IPsec can be used for setting up virtual private network in secure manner How it works IPsec works by checking the IP address of the destination or source against policy configuration to determine either the traffic should be considered IPsec purpose IPsec is important because ensure confidential data. It also ensuring provide se

Network security devices

Image
Network security devices 1.     Firewall 2.     Network router 3.     Virtual private network gateways 4.     Network access control (NAC) 5.     Proxy server 6.     Spam filter 7.     Anti virus 8.     Secure modems 9.     Intrusion detection system(IDS) 10.   Intrusion prevention system (IPS) 11.   Wireless intrusion prevention and detection system (WIDPS) 12.   Unified threat management (UTM) Explain 3 1.     Virtual private network gateways VPN is a programming that creates encrypted and safe connection over the public internet. It usually used the internet to connect remote user or sites together.   VPN is using protocol tunnel to encrypting data at the sending and decrypting it at the receiving. Virtual private network (VPN) tunnel creates point to point connection so that it cannot be access by unauthorized person. To create the VPN tunnel is by the device need to run a software application in the cloud or locally. Advantages of VPN

Activity -Business Intelligence

Image
1.     Produce a table of example for unstructured and semi-structured data 2.     Explain each type of decision in business and give an example (Strategic, Tactical, Operational) 3.     Discuss the functionality business intelligence 4.     Give the advantages and disadvantages of using an application software as a mechanism for business processing Unstructured data It is not organized properly and does not have associated model of data. This type of data is usually in heavy text and multiple types of data. Example of unstructured data is health record, PDF files, books, photos, videos, text message and blogs. Those file are not being organized other than being placed into an object store or file system. Semi structured data A data types data containing semantic tag but it does not coordinate to the associated structure with a typical relational databases. Semi structured entity may belong in the same class but different attributes. Exampl

Types of attacks -Network security

Types of attacks Passive - Difficult to detect, because the attacker isn’t actively sending traffic (malicious or otherwise). - Just install the virus and let the virus work by own. Active - Easier to detect because the attacker is actively sending traffic that can be detected. Close-in - It occurs when the attacker is in close physical proximity with the target system. Insider - Legitimate network users leverage their credentials and knowledge of the network in a malicious fashion. Distribution Intentionally introduce “back doors” to hardware or software systems at the point or manufacture. How to prevent that attack Attack class Primary layer of defense Secondary layer of defense Passive Encryption Application with integrated security Active Firewall at the network edge Host intrusion prevention system(HIPS) Insider Protecting against una

Flowchart - Business Intelligence

Image
Process of MIC for HND Process of buying and owning a car in Brunei

Network security

Image
Network security Three primary goals of network security is 1.     - Confidentiality -        -  Integrity -        -  Availability A method of gaining access to a system that bypasses normal security measures -           - Creating a back door -         -   Launching a dos attack -           - Starting a smurf attack -          -  Conducting social engineering Types of security -           Internal threats -           External threats  Potential attackers – Types of hackers -           White hat hacker -           Black hat hacker -           Gray hat hacker Gray hat hackers - Is a cracker who exploits a security weakness in a computer system or product in order to bring the weakness of the owners. - Gray hackers are breaking down laws and violating ethics, but their intent isn’t malicious. - Gray hat hackers is representing the middle hackers between white hat hackers and black hat hackers. Example of gray hat hackers A