Posts

Culture - 2

The ethical and moral impacts of increased reliance of digital technology Impact of company culture can be seen across individuals, groups, and cultures and can more specifically be about changes in face to face communication changes in productivity and output changes in reach and sale of product - organic/paid/viral growth changes in staff monitoring adaptive working practices - increased productivity, reduced costs etc autonomous operation + cost effective + enhanced quality assurance + productivity + reduced risk to employees in hazardous conditions - loss of jobs - loss of human empathy Shift in skills needed Impacts on society loss of privacy - digital footprint, surveillance changing behaviours - social skills, remote engagement, digital/curated identity communication access - resistance to change, isolation Improved access to information Impact of unsafe usage of digital tech phycological - cyber bullying, mental health, addiction, stress Physical impacts- posture, eye strain, R...

Security - 10

Types of confidential info HR data - employee salaries, perks, data, medical info Client/customer data Profits Contracts Trade secrets CIA triad Confidentiality makes sure only authorised parties with sufficient privileges can view sensitive info, this is usually done with encryption.  If unauthorized individuals can access and view confidential data, confidentiality is breached. Integrity makes sure stored data has no been altered by malicious people or software, methods to keep integrity include error checking methods such as check sums and file hashing.  If data is modified without authorization, integrity is compromised. Availability makes sure data is easy to read and readily available out for authorised individuals.  If users cannot access the system or data when needed, availability is affected. The importance of maintaining CIA maintains trust with stakeholders, as it promotes a positive brand image avoids security risks and unauthorised access The consequences of...

Data - 3

 Types of data numeric data - representing using any number type text data - represented using text media data - represented using video or audio geospatial data - represents a location/area temporal data - represents a moment in time logical data (Boolean data) - has two choices A or B Sources of data Internal data - sales, marketing, financial, employee, customer, usage (website traffic, etc). data that is sourced internally and should be kept within the org. External data - public data government data, supplier, competitor, sector data. - data that can be found by anyone, companies still need this data Methods of Data storage - on premises Internal databases - with databases and relational databases Hard drives - HDDs, SSDs File server - (file structures) Network attached storage (NAS) - a storage device that is attached to a network and acts as a central point for storage, management and access of files Storage area network (SAN) - a network of interconnected storage devices Me...

Types of virtual switches

  Types of Hyper-V Virtual Switches Using Virtual Switch Manager, you can create three types of Hyper-V virtual switches: External  switches are bound to the physical network cards located in the host. They provide VMs located on them access to the physical network to which the Hyper-V host is connected. The External switch can also share management traffic and VM traffic on the same switch, which is one of the options that can be set when creating the external switch. Internal  switches are not bound to a physical network card. They only allow traffic between VMs and the host itself. However, in 2016, new functionality was added to allow external connectivity via NAT from the Hyper-V host: the NAT forwarding internal switch. Private  switches are only used for virtual machines to communicate with each other. This type can be useful for specific types of traffic such as a cluster network only if you are using one host (as it can’t be used between hosts).

ESP overview

  task number  focus  No. Of hours  Marks allocated  1  Trouble shooting and test planning  2 hours 30  22  2  Interview and communication  2 hours 10  12  3  Project proposal  4 hours  24  4  Post project review  3 hours 30  12    Task uno:  This focus on trouble shooting a fault based on a specified problems/issues and designing a test plan.   The troubleshooting document should include:  User details   Test dates  Computer specs and software  Proposed tests and expected outcomes   Record of diagnosis  The test plan should include:  Administrative details E.G. dates names.  Test dates   Hardwear specs and software   Actual and relevant tests carried out in a logical order including images/diagrams  Full and complete details of expected outcomes  Remedial action required   Task d...

Technical and Non-Technical Threats to Organizations

Technical and Non-Technical Threats to Organizations Several threats to organizations are capable of doing large damage. These are either technical or non-technical (environmental, human, and procedural). Technical Threats Botnets: A botnet is a collection of hacked computers operated by cybercriminals. Bot herders scan for vulnerabilities, infect systems, and use them for malicious activities, such as DDoS (Distributed Denial-of-Service) attacks. EG the Mirai botnet in 2016 that infected IoT devices, leading to a massive DDoS attack. Denial-of-Service (DoS) & Distributed Denial-of-Service (DDoS) Attacks:  These attacks overwhelm a system with requests, making it unavailable for the average person to use, it can be: Application-layer flooding: In this attack type, an attacker simply floods the service with requests from a spoofed IP address in an attempt to slow or crash the service Unintended DoS (accidental overuse) DDoS (many computers attacking one target) EG...

hw 12/5

Test yourself 241  A botnet aims to take control of digital systems. It is a type of malware that allows a cyber security attacker to take control of someone's system without their knowledge.   The aim of a DOS attack is to make a network inaccessible to users. It does this by flooding the network with traffic which in turn slows its speeds down to a point where it is basically unusable.  One of the main differences between a DOS attack and a DDOS attack is a DDOS attack tends to use multiple devices to try and infiltrate a network. The types of networks that are usually under threat from these would be ones like websites, banks, and payment websites.   Some of the main websites that are targeted by DDOS attacks would be ones like banks and payment websites.   Test yourself 242 One way of trying to find a password is using a dictionary software. This goes through some of the most common passwords and trying them when trying to get access to the account....