Friday, 27 November 2009

How security should be implmented at Loughborough College

This week, I am going to write about how Loughborough College should implement security into their network system.

Security issues have become more of a concern in establishments like colleges because hundreds of people are using the network on day-to-day basis; hence high security has to be acknowledged. The reason why high security is essential is the network can be prone to hacking and malware being obtained onto the system.

How I think Loughborough College should implement security at each level:

Computer networks have different levels of security for example; administrators can access all users accounts simultaneously, access to drives on the network. Also they have access to all drives on the computers that are networked for example, hard drive, flash drive, CD/DVD drive etc with no restrictions. Managers, teachers, lecturers and head of departments have a different level of security for example; they have a more limited access to the network, they cannot access certain accounts, banned from inappropriate websites, limited access to drives on the network etc. Employees and students have the tightest level of security for example, tight control over the network drives, no control over accounts and banned from inappropriate websites. Use severs that are dedicated for securing the network.

Friday, 20 November 2009

Coursework Update

I am going to present my P5 presentation on Tuesday 8th December, because the lecturer has split the class into smaller groups. The reason why the lecturer has done this is because students can perform better in smaller groups rather then presenting to the whole class.

Making my own computer system

This week I am going to write about how much my computer system will cost to build if I intend to build the computer system myself. I have worked out how much my computer will cost on a MS Excel spreadsheet, which includes the appropriate software and components needed for my computer to be functional. I have also included cost for each item, because this will give me guidance on the estimated cost of the system and its requirements to become operational, by selecting appropriate software/hardware.

The reason why I have chosen to build my own computer is because I have learnt that it has known to be cheaper than buying standalone computer system, because you can use components/ software that you want, which is optimal for your user need. If you bought a standalone computer system you might not need/want some of the features or its just not what you thought the system is going to be like i.e. user experience and the hardware specification does not fulfil the performance that you desire.


Click to enlarge image of my MS Excel spreadsheet for software/hardware cost:

Friday, 13 November 2009

Computer Hacking & Firewalls

This week I have decided to explain about computer hacking and firewalls i.e. how firewall safeguard the user from hackers.


About Hacking

Hacking refers to, when a group or single user is trying to gain access to someone’s computer via networks. Before accessing someone’s computer, hackers have to bypass the security settings before they can gain access this is where a firewall comes into play to safeguard you.

The list below shows what hackers can achieve once they gain access to the computer system:

  • Can monitor on what the user is doing.

  • Obtain computer programs and alter their settings.

  • Obtain private and confidential data and copy or even cut it to their computer, for example; credit card numbers, bank account details, user passwords for e-mail accounts and other types of accounts online are all at risk.

  • Format the users hard drive

  • Make changes to computer settings

  • Once they have got hold of the users data, the data can be sold onto malicious groups, which my lead onto identity theft issues further down the line.

  • If they use your personal information for drug dealing and other sorts of malicious crimes, then you might get a criminal record and you might have to prove that someone’s stole your I.D.


How firewall security works?

Firewalls are barriers that protects against unwanted access from unknown users, hackers or users that are blocked from the network system. Firewalls work by allowing and denying ports on the network or IP address.

If someone outside the network was trying to hack into the network system they will be denied access from the network because it will deny access by blocking their IP address or port using TCP/IP module. In simpler terms a firewall is to protect the network by blocking malicious software or applications outside the network, which might be used by hackers.

There are two types of firewall, which are hardware firewalls and software firewalls .


Diagram on how firewall safeguard the network system:


Coursework Update

In this unit, I am managing to keep up with my course work. At the moment I have completed; P1, P6, P2, M2 and nearly completed my P3 presentation. I have chosen Dubai as my topic for my presentation, which I will be presenting on Tuesday 17th November 2009. Overall I think my progression rate in this unit is good because I am handing in the required tasks within the required time set by the lecturer. Also I am updating this blog weekly as required, but this is the first time I am including weekly updates of my courses work in this unit. From now on I intend to include weekly updates on my progression in this unit as well as my chosen topic, which is about computer systems.

Friday, 6 November 2009

Advatages & Disadvantages of networks

This week I have decided to talk about advantages and the disadvantages of network technology. Choosing the right technology and employing someone with the right skill set is crucial, because specialist skills are needed to set up networks. The technology used should be optimal for area where the network is going to be set up e.g. using the right topology like Ring topology for instance.

There are many positives of networked systems as well as negatives. Here is a list of advantages and disadvantages of setting up network systems:

Advantages

Fast Response Times - With efficient and high performance servers e.g. with fast processor, bigger memory capacity, hubs that use optical fibre cables etc. The response time will be less noticed, for example all of the workstations in a workplace, which are connected to the network will not regularly experience; system crashes, slow systems, loss of connection from the network etc, due to the server that is being used and the cables, which are optical fibre. With low response times in an organisation tasks become faster and more efficient.



Unauthorised access to information - Most networks have accounts for each user, which need Account ID and password to login. To prevent unauthorised information to be accessed, administrators or network managers set access rights. The login procedure identifies the user and tells the server of their permissions and access rights, these terms show what that specific user can and cannot have access to.

Network topologies - The use of the right network topologies for network systems is crucial because this will reduce cost and complexity of the network, for example the network manager in organisations will choose a network topology that will run the network efficiently and take into account hardware, which needs to be networked. There are many different network topologies, which are Ring, Mesh, Star, Fully connected, Line, Tree and Bus. All have different ways of communicating between hardware e.g. workstations.

Disadvantages

Slow Response Times - An office with a small server that has got low performance components running the network, which all of the office’s computers’ are connected and running simultaneously will result in longer response times. This means the system will have, regular system crashes, system running slowly and other factors which make the network congested. When slow response times occurs in the network system users tend to become frustrated.

Staff skills - Network users need slightly higher skills than those using just a standalone computer. Training can be provided for those who are not familiar with network systems by showing them how to log on, the importance of passwords, sharing files and using work areas. Some organisations put users on training courses so that they are familiar with network systems, but this can be time consuming and costly for organisations hence organisations would prefer staffs, which are already qualified.

Increased Complexity and Costs - Network systems are known to be more complex than the same number of standalone computers. Due to interconnection of all the hardware, also installation of the operating system, adds to the overall complexity hence the costs of the system.

Security Issues - Security issues can become a problem in organisations, for example if a user works in an office environment and the user’s friend who worked in same office, access your personal record from their workstations. There might be information stored that you do not wish to share with anyone in the organisation. Examples of information you do not want anyone to know home address, mobile phone number and home phone number, unless you have chosen to give it to them hence you may not be happy if everyone in the office could access that information.


Example of a network:






Useful Links:

http://en.wikipedia.org/wiki/Computer_network

http://en.wikipedia.org/wiki/Network_topology

http://en.wikipedia.org/wiki/Local_area_network

http://www.howstuffworks.com/fiber-optic.htm