Sunday, May 19, 2019

MSCP - Qualitative and Quantitative Rsearch Methods.

1.Focus on different methods of gathering data and materials. Feedback the advantages and disadvantages.
2.Choose the method that you will use in your project. Justify your choices.



Quantitative
Qualitative

Survey
Interviews
Observation
Focus groups
Secondary data
Post cards

Secondary data

Observation


Quantitative

Qualitative
Survey
Interviews
 Ad:
 Ad:



 Dis:
 Dis:


Focus groups

 Ad:
Observation

 Ad:
Dis:



Post cards
 Dis:
 Ad:



 Dis:
Secondary data

Ad:
 Secondary data

 Ad:


 Dis:
Dis:



 Observation

 Ad:



Dis:



2. survey 



For these quantitative research method, i am choosing survey for gathering the data. This is because / the reason i am choosing this because`

Tuesday, May 7, 2019

For each of the tools:
1) Provide the description
2) Discuss its importance
3) Give the advantages (2) and disadvantages (2)
4) Explain why organizations need to implement it
5) Explain what will happen if it is not configured/set up properly.

Descriptions:

NAT

- Stands for Network Address Translation
- Its job is to hide the IP Address when to connect to the Internet

DMZ

- Stands for Demilitarized Zone
- Its job is to securing the internet
- It will block the hackers to access the server or internet

Firewall
- A part of computer system or network, that is designed to block the unauthorized access, while permitting outward communication



Importance:

NAT
It conserves the number of public addresses used within an organization, and it allows for stricter control of access to resources on both sides of the firewall.

DMZ
 to provide another layer of security for a local area network (LAN). If a rogue actor is able to obtain access to services located in the DMZ, they are not able to gain full access to the main part of the network.

Firewall
protects your computer from being attacked over the internet by hackers, viruses, and worms

Advantages and disadvantages:

NAT
Advantages: 

1.Reuse of private IP addresses
2. Enhancing security for private networks by keeping internal addressing private from the external network
3. Connecting a large number of hosts to the global Internet using a smaller number of public (external) IP address, thereby conserving IP address space
You help in conserving the IPv4 address space (when you use NAT Overload)

Disadvantages:
1. Because many applications and protocols depend on end-to-end functionality, your network may not be able to use some of them. As we already told you, hosts inside a NAT network are not reachable by hosts in other networks.
2. End-to-end IP traceability is also lost. If you need to troubleshoot your network from a remote site, you will find troubleshooting more difficult and sometimes even impossible.

DMZ
Advantages:
1. Increase the security of our network
2. Allows you to expose your network publically

Disadvantages:
1. Requires maintenance and proper knowledge to employ, depending on the size and importance of the network.
2. if hackers are able to penetrate your firewall, they will have access to both the DMZ and the internal network.

Firewall
Advantages:
1. A firewall blocks "evil packets" from being "permitted to reach a place where they can do harm.
2. It provides good traffic management.

Disadvantages:
1. Packet filtering by a software firewall can degrade your system's performance, because it's a demanding task to examine every packet of data. 
2. A hardware firewall eases this burden.

Explain why organizations need to implement it



Explain what will happen if it is not configured/set up properly







References:

Internet, T. and Translation, N. (2019). What is Network Address Translation (NAT)?. [online] WhatIsMyIPAddress.com. Available at: https://whatismyipaddress.com/nat [Accessed 13 May 2019].


Idc-online.com. (2019). [online] Available at: http://www.idc-online.com/technical_references/pdfs/data_communications/DMZ.pdf [Accessed 13 May 2019].

Security

Implementing Network Security Solution.

Explore a range of:

- Tools (2), Metasploit Framework & Nmap
- Techniques (2) and
- Methods (2)
Used for implementing network security.

3. MOBILE DEVICE MANAGEMENT

MDM software bolsters network security through remote monitoring and control of security configurations, policy enforcement and patch pushes to mobile devices. Further, these systems can remotely lock lost, stolen or compromised mobile devices and, if needed, wipe all stored data.

4. NETWORK ACCESS CONTROL

NAC products enforce security policy by granting only security policy–compliant devices access to network assets. They handle access authentication and authorization functions and can even control the data that specific users access, based on their ability to recognize users, their devices and their network roles.

Key considerations for planning and undertaking research

Determine what the key considerations are for planning and undertaking research. Research questions.  Certain research quest...