Search This Blog

Final: Tech Topic Connection

  Week 5 Final Project Blog Post:               Information technology (IT) is a dynamic and exciting field that has limitless possibili...

Monday, April 22, 2024

Final: Tech Topic Connection

 

Week 5 Final Project Blog Post:

 

            Information technology (IT) is a dynamic and exciting field that has limitless possibilities and avenues that can be pursued. The main effort of IT and its abilities is to manage and process information, spanning across countless fields. This blog post explores the fundamentals of information technology through the lens of the specific topic of cybersecurity. We will explore how cybersecurity integrates into the various aspects of IT, focusing on the areas of computer science concepts, hardware components, programming languages, application software, databases, and network architecture. By examining all of these, we can see just how in depth cybersecurity and IT really is.

           

            In a world where computers and their information needs to be protected due to constant attacks, cybersecurity is an integral aspect. Cybersecurity focuses on protecting computer systems, networks, and information from attacks, damage, and prying eyes that are not otherwise authorized to access the available information. To understand cybersecurity, one must have a solid grasp on the concepts that are synonymous with computers such as algorithms, data structures, and computational theory. Applying all of these concepts are the bedrock for ensuring secure computer systems and even data encryption.

 

            The history of computers and cybersecurity are closely related. In the early days of computers, there were security concerns that evolved as technology did. Gone were the days of keeping paper data files and records locked and stored in a secure vault. The computer and its ability to generate and store information was advancing and progressing faster than anyone had imagined. The problem arose with keeping the information that was being generated and stored on these devices safe from unauthorized users. Modern cybersecurity practices stem from a deep understanding of how computers are built, how the operating systems function, and general software development principles. Encrypting and authentication are rooted in computer science theories and methodologies.

 

            Cybersecurity heavily relies on the hardware components and functions of the computer system. Case in point, cryptographic algorithms harness the processing power of the CPU’s in order to both encrypt and decrypt information. Hardware security on the other hand provide secure storage for crypto keys. There are network security appliances such as firewalls and intrusion detection systems that are designed for packet inspection and analysis.

 

            Programming languages are vital in the development of security protocols, implementing defensive measures, and conducting vulnerability assessments. Programming languages like C, Python, and Java all offer their own unique advantages when dealing with different aspects of research and development of security. There are different methods such as dynamic analysis and fuzzing, both essential when there is a need to identify vulnerabilities in software.

 

            Application software is another key tool in cybersecurity because it provides the necessary tools needed for monitoring, analyzing, and responding to security threats that may present themselves. Security information and event management (SIEM) software collect log data from different sources so the computer can detect suspicious activity and thwart potential security threats. “A SIEM‐based framework can be used for centralized and integrated management of the ten automatable security controls” (Montesino, R., Fenz, S., & Baluja, W., 2012). Antivirus software uses signature-based detection to locate and remove malware that may have entered the system. In addition to all of these applications, endpoint security solutions protect devices from unauthorized access and harmful software.

 

            Cybersecurity aligns with database concepts and management through the protection of the sensitive and valuable information that is stored in databases. Encryption, controlling access, and masking data are all used to keep the information safe from breaches in data by unauthorized users. Database management systems (DBMS) play a vital role in keeping the integrity of data by applying security measures like role-based access control and transaction logging. DBMS have changed the way that many organizations operate. (Chopra, R., 2010)

 

            In conclusion, cybersecurity is a critical component of information technology. It encompasses a wide variety of concepts and practices that have been developed over the years alongside the technology itself. There is a fine balancing act to ensure that the cybersecurity measures stay on pace, if not ahead, of the advancements that are being made in the information technology field. Being able to understand principles like hardware components, programming, applications, databases, and network architecture are crucial for someone in the cybersecurity world.

 

References

Chopra, R. (2010). Database Management System (DBMS) A Practical Approach. S. Chand Publishing.

Montesino, R., Fenz, S., & Baluja, W. (2012). SIEM‐based framework for security controls           automation. Information Management & Computer Security20(4), 248-263.

 

 

Thursday, April 18, 2024

Network Security

 

Understanding Network Attacks

 

               Having the ability to understand computers and their capabilities is crucial for both professionals and enthusiasts. As technology continues to advance and become more and more integrated into everyday life, learning about tools like a ping command is a valuable skill. This knowledge can be useful for troubleshooting network connectivity and other connection related problems. Conversely, these simple commands in the wrong hands can be used as a type of attack. Depending on the intent of the user, ping commands can be both good and bad.

 

              Ping commands in their simplest form can be run to test network connection and troubleshoot any issues along the way. Available to every user on their daily computer, these commands prove to be helpful in many ways. “The PING-based Distributed Denial of Service (DDoS) attacks are known to be quite damaging to the availability of the web-based services.” (Kumar, S.,2006).  Ping commands can also be used to execute several types of lethal attacks in ways such as Ping Floods, Smurf Attacks, and even Ping of Death. Ping floods infiltrate a targeted system by essentially overloading it with many ping requests that consume its operating power and cause system failure. Smurf attacks are an amplified version of the ping flood, broadcasting ping requests to a whole network, causing massive disruption across a wide variety of assets connected to the network. The ping of death manipulates the ping packet sizes. This alteration causes buffer overflow and can lead to the entire system crashing.

 

              Computer viruses infiltrate and propagate systems by identifying and exploiting their vulnerabilities. Viruses can be diagnosed by a number of symptoms that the everyday user can easily identify. These symptoms include slow performance, data corruption, and even access denial to files that should otherwise be accessible. Preventative measures can be taken to mitigate viruses by keeping the system updated, installing robust antivirus software, and educating oneself on safe computer use practices.

 

              Phishing attacks are very common as they can be masked as a harmless item. “Phishing is an attack wherein the attacker exploits social engineering techniques to perform identity theft.” (Aleroud, A., & Zhou, L., 2017). A simple deceptive email or website link can be programmed to steal sensitive and valuable information. Once the system is compromised it can result in financial losses, identity theft, or even access denial to the whole system. There are preventative measures for this threat as well including email filters that are designed to detect corrupt links, multi-factor authentication, and user training.

 

              Computers are incredibly useful and powerful devices, aimed at enhancing the everyday life of their users. They are also inherently vulnerable to threats, ranging from network-based ping attacks to social engineering tactics like phishing. Taking proactive measures like keeping the system updated, upgrading software, and educating oneself in threats can help keep the system at a low risk of being infiltrated. It is imperative for organizations and individuals to remain vigilant and implement robust security measures.

Computers in the Workplace

    For this week’s discussion post, I chose to focus on education and the importance of information technology in this field. Ironically enough, I am typing this assignment on my computer and working online to complete it. Education is rapidly moving towards the online platform which requires computer literacy from both students and educators.

               During the pandemic of 2020, the world saw how many activities and educational lessons could be done on computers as this became our only option for continuing these. All of the technology that is available such as video teleconferencing, file sharing, and project collaboration all became readily apparent as efficient ways to accomplish tasks. Students could now continue working on group projects, work at their own pace, and still have the option to see each other during video calls. What we learned from this is that maybe the old way of education can be done in a more efficient manner. Information technology is important because having the computer literacy to use the programs, complete the assignments, and communicate remotely required knowledge from everyone. Parents, teachers, counselors, and even students all needed to be able to perform basic tasks on a computer. Things like software updates, installing programs, keeping a steady network connection, and understanding assignments were all crucial in keeping the classroom alive.

               Over the next 10 years, this style of education will only continue to advance and grow. Computers and learning activities will shift more to the online version, as you can reach a wider base of students anywhere in the world and still provide the same information. Technology will continue to advance and the ones who are computer literate will benefit greatly by simply keeping up with the times.

 

Todd

Traveling through a Network

 

Good morning class,

 

This week’s discussion prompt was interesting to me as I have not used these functions on my computer before. I have heard the terms such as “Ping” or run a “Tracer”, but I never fully understood what they meant. Seeing the inner workings of the internet and how the information travels through connections is actually very fascinating for me.

Starting with the Ping functions, I chose two websites that were in my part of the world (in addition to the required google ping). I was curious to see if the results would be different than my classmates that may run a ping to japan but don’t live here. Below are the results that I got, showing the number of packets of information, how many were lost if any, and how fast the ping was completed. My initial reaction is that all of the information being shared around the world at lightning speed is truly remarkable. When a packet of information is sent from a source to a destination, it has to travel through multiple routers and networks before returning to the source. This helps in analyzing the latency or delay that may present itself between the two destinations.

 

On the flip side, the traceroute command shows a more detailed view of the path that the packets of information traveled. Every hop from router or network segment was shown (displayed as an IP address). This is possible because the traceroute send packets with increasingly larger TTL (time-to-live) values, which essentially causes them to expire at each hop along the way. Below are the traceroutes for the three websites that I chose to ping earlier in the same order.

 

Overall, using the ping and traceroute commands showed me that they are valuable tools that can be used to diagnose and understand network connectivity. This will be especially useful with troubleshooting internet connection issues. Being able to see the round trip times and paths can really help find the root problem.

Todd

Documenting a Day

 

Week 2 Word Processor Journal Entry: Todd Ball

For this week’s journal entry using the word processor application Microsoft Word, I will describe in detail the events that took place on Monday 1 April 2, 2024. I will use a numbered outline system paired with descriptions to best capture the events of the day.

1.      6:30am: I woke up 30 minutes before my son had to be awake. This allowed me to go through my morning routine before starting my sons before-school routine.

2.      7:00am: I woke my son up for school and began making him breakfast. This consisted of a glass of water and a sliced apple with a serving of peanut butter (for the protein).

3.      8:00am: Once my son was prepared for school, he walked to the bus stop with his friend. After he was safely on the bus, I drove to the gym for my morning workout.

-Today’s workout consisted of multiple chest exercises paired with shoulder exercises. The entire workout took approximately 1 hour.

4.      9:30am: I returned home and logged into UAGC where I posted two replies to my classmates for their week 2 discussion post.

5.      11:00am: I needed to prepare dinner for the family (I am on vacation which is why I am home during the day). I chose to make smoked baby back ribs for dinner this evening.

6.                     -prepared the ribs by applying a rub before putting them on the smoker.

7.      1:00pm: I logged back into UAGC and continued my preparation for this week’s two assignments. I read the required chapters and reviewed all of the supporting material that would be required to complete the tasks.

8.      4:00pm: My wife and children returned home from school and work. After they were all home, I finished the meal and we ate around 5:30pm.

9.      6:00pm: My wife and I went outside and spent quality time with our children and their neighborhood friends.

10.   7:30pm: My wife and I took out dog for his evening walk around the base.

11.   8:30pm: We put our children to bed and tidied up the house, making preparations for the next day.

12.   9:30pm: Went to bed.

This is a typical week day in the Ball household. During the school week, we like to focus on our requirements and being prepared for the following day. This allows us to reduce the anxiety of getting ready the morning of an event or school.

 

Todd Ball

Web/Mobile App Critique

 

For the discussion post this week, I will be reviewing the Google Photos App. Let me first start by saying that all my “devices” are Apple products and I love them dearly. I have the stance that while I love the wide variety of options that Android products provide, I do not believe that they are fully developed and thus, lead to issues earlier than I would prefer. In today’s busy world, I simply want to turn my phone on and have it work exactly how I expect it to. No flash, no fluff. With that being said, one thing that seems to be a recurring issue is storage on Apple devices. As camera’s continue to advance along with the internal hardware, storage is a hot commodity. Apple does not allow for external storage upgrades so whatever size you bought at the time of purchase is what you must work with. For an everyday user that does not understand the concept of cloud-based storage, they often find themselves going back through old memories and deleting videos and photos to make room for the new game that their child will play for the 5 minutes they are sitting in the waiting area. This is where Google Photos truly takes the cake.

 

The Google Photos app is paired with the camera roll on the iPhone, automatically syncing all the photos that were taken with the device. Once the device is connected to Wi-Fi, the app will begin the backup of the photos, essentially creating copy of the photo that can be access with any network connected device. Below is a screenshot of the app showing the options of the backup along with the “free up space” button.

googlle 1.JPG

After the backup is completed and the app has created a copy of the photos and videos, it is now stored in a “safe” location at an exponentially smaller storage size. One downside to using this method for keeping photos is when you are on-the-go in an area with poor cell phone reception. In this scenario, you will be able to see the thumbnail of the photo with a small cloud in the bottom right, but when you click on it to show someone, the photo won’t load. While this is an inconvenience, it is rare that I run into this issue as cell signal is prevalent in a large amount of places worldwide. A recommendation I would make is for the app to at least allow the user to view the photo or video at a reduced resolution.

 

Another benefit to the app as seen below is the option to upgrade the amount of storage that you want to use. As the main photographer for my family, I like to take videos and pictures of my families adventures and that can sometimes result in large file sizes.

google 2.JPG

Another suggestion I would make is to do promotional events that would reduce the cost of the storage (i.e. throw in a free year of 2tb storage for with the purchase of a Google home). The third recommendation would be for Google to also delete “portrait” photos on the iPhone as that seems to be a hang up in the system. While the app does backup the portrait pictures, it does not delete them from the device, thus continuing to take up storage.

 

Todd

Programming Languages

 

PROGRAMMING LANGUAGES REFLECTION

 

              Learning a new language can be a difficult task, especially for someone that has little to no experience. Computer programming and coding is a widely discussed topic among the technology communities, however, the art of writing code that actually works takes effort. There are many different ways to write computer code and based on research, it comes down to personal preference when choosing the program. Platforms such as Python, C, and C++ are taught at the collegiate level. Scratch is another program that is available for new students to be introduced to programming. All of these platforms are highly efficient in their own way, each with their own flavor.

              Using Scratch introduces users to the basics of coding logic and program structure. There are pre-installed options that can be linked together in a sequence to make actions. (Ball, 2024) Understanding the functions and how they work together can be confusing at first, causing difficulties. After spending some time testing different options, Scratch’s mechanics become easy to understand. Watching the available tutorials and online resources helps new users to gain an understanding fairly quick.

              There are noticeable differences between entry level coding programs and the higher level options that explore machine learning, assembly language, and high-level languages such as python. “Python, an open source scripting language, has become the most popular introductory teaching language at top U.S. universities” (Shein, 2015) In the textbook, there are examples showing the uses for machine learning with explanations on how each line works. In terms of ease and understanding, Scratch is obviously the winner when it comes to simplicity. Everything is built in to the program for the user to drag and drop, making it easy to grasp. Python on the other hand, requires deeper studying paired with trial and error before it can be mastered.

              Each of the two programming applications are strong in their own way. Scratch is easy to understand, user friendly, and built in a way that even a child could understand it. “students learn to understand what computing can/cannot do, understand how computers do the things that they do and apply computational tools, models and ideas to solve problems in various contexts” (Fagerlund, J., Häkkinen, P., Vesisenaho, M., & Viiri, J. (2021). Python is a more advanced version of programming and is capable of much more powerful and in-depth code writing. Scratch would be a great tool for educational purposes while Python is essential for tasks requiring direct interaction with hardware.  


Ball, Todd 2024: https://scratch.mit.edu/projects/988917750