Posts

Showing posts from April, 2019

Security Vulnerability Test - Virus Detection

Image
Describe the test and purpose of the test. Virus detection is when is there a viruses that is detected on the computer by using the Antivirus software. The purpose of virus detection is to make sure whether there are viruses or any infected files or data that is inside the computer. Discuss how it works. Virus detection works when the user click "Scan" or "Scan your Computer" on the Antivirus software. Then the user will have to wait until the scanning to be completed. After the scanning is completed, the Antivirus Software will show how many of the data and files are scanned with the time duration. In here, the software will also show and detect if there are any virus threats inside the computer. Provide example of the test. Example: Comodo Antivirus Discuss the solution if there is vulnerability after a test. So when the virus threat is detected on the computer, then the user has to clear the virus threat by using the Antivirus software on the comput...

MSCP

Initiation of the project & project planning phase Scoping a project To start a new project is by defining its Objectives - how to achieve the project? Scope - The scale of the project Purpose - why are you doing the project? Deliverable to be produced - The task that are you going to do before and after the project. Objectives What specific outcomes will be achieved, and how will you measure thee outcomes? Remember to limit the number of objectives for your project - four of five goals are typically enough. (Hint: the first word / verb on the LOs) Scope What are the boundaries for this project (for example, type of work (like small-scale project), type of client (Specify the person - gender, age), type of problem, geographic are covered (place/locations)? List any areas excluded that you believe stakeholders might assume are included, but are not. The more specific you are, the less opportunity there is for misunderstand.... Aims Why are you doing this work? D...

Why is Organizational Security Important? - Group Activity

Image
The Philadelphia Insectarium and Butterfly Pavilion Philadelphia Insectarium and Butterfly Pavilion is a science museum and to showcase one of the most diverse living arthropod in the United States. It is also a place where the facility can house and take care of the creatures such as insects and lizards. Summary from the Article: - 7,000 Bugs and Lizards Were Stolen from a Museum This case was happened on 22 August 2018. Approximately 7,000 insects, spiders, scorpions and lizards were stolen from the museum. Thieves had stolen more than $40,00 worth of insects and lizards, and it was suspected that the thieves will try to sell many of the highly prized creatures to collectors. Later on, the thieves were founded through the CCTV footage and it was suspected that the thieves are the employees from the organization. Suggestion: - Access Control for Physical Entry - Security Guard / Biometrics Security System Logs Why Organizational Security is Impor...

Method of Threat

Image
Packet Replay Description A packet replay is a network security threats where an attacker will detects and intercepts the data transmission between the two clients. Then, the attacker will sends the repeated data to the clients. How it works? It works by replaying the authentication messages from the sender to the receiver. A packet replay occurs when unauthorized user captures network traffic and then sends the communication to the original receiver which the unauthorized user acts as the original sender. How to prevent? Create timestamps where it allows the authentication system to accept only the appropriate timestamps of network packets. So, if the timestamp reach beyond a certain time, then the packet will be discarded.

Security

IT Security Risk The problems and the dangers of the IT security A level of threat to organisational continuity Originating from malicious Poor quality security policies and testing/audit procedures IT Security important To prevent from stealing information Types of it security risk Unauthorized use of a system - Hacking -Unauthorized access is when someone gains access to a website...or other system using someone else's account or other methods. - E.g Guessing the password of someone account - Unauthorized access of area of the system such as company (Departments) Cause:- loss of the confidentiality loss of the integrity loss of the availability of the information technology assets. How to prevent:- Provide computer-based access control (Strong Password) Add additional securities such as biometrics Restrictions for only department such as HR department the information not for others Monitor such as BIBD Protect your information Unauthorized removal or c...

MSCP - Research Activity

Explain project management Project management  is managing the application of processes, methods, knowledge, skills and experience which to achieve the project objectives. Identify the key stages of project management  Initiating Planning Executing Monitoring and Controlling Closing Identify the advantages and the importance of implementing project management Advantages: Better efficiency in delivering services Increase in the quality and the quantity of the project. Improved Customer Satisfaction Importance: Clearly defines the plan of the project before it begins Establishes an agreed schedule and plan Helps to manage integration https://www.pmi.org/about/learn-about-pmi/what-is-project-management https://www.brighthubpm.com/project-planning/2350-the-top-ten-benefits-of-project-management/ https://www.sinnaps.com/en/project-management-blog/importance-of-project-management