Understanding Internet Technologies and Security. Answers to the assignment from page 352-353.
TRUE or FALSE
1. TRUE 2. FALSE 3. TRUE 4. TRUE 5. FALSE 6. TRUE 7. TRUE 8. TRUE 9. TRUE
10. TRUE
MULTIPLE CHOICE (select best answer)
1. Fiber Optic Cable (D) 2. ICANN (C) 3. Radio Frequency (A) 4. Decryption (A) 5. Bridge (A)
6. Certificate Authority (A) 7. Videoconferencing (A) 8. IP data services (C) 9. MAC (C)
10. Worm (A)
Monday, December 14, 2009
Chapter 5-6: Define terms & Questions/ans. p.352-353 hm.
Answers to Chapter 5-6: Define Terms and Questions
1. Cyberbank: A virtual bank that has no physical facilities and offers products and services solely on the internet.
2. Brick and Click: A business that allows customers to conduct business or complete transactions at a physical location as well as online at a web site.
3. Brick and Mortor: The old traditional way of conducting a business transaction, primarily in person at a physcial location, over the phone, or using paper-based transactions.
4. Sticky Website: An interactive website that users visit often and browse for long periods of time.
5.Drilling Down: A process where the user moves from categories to sub-categories, to a useful link and finally, through to the website. One can say it is like leaving a breadcrumb trail that shows the hiearchal arrangement of the users previous links.
6. Cyberslacking: A form of abuse of business computers by employees; whereas they misuse the company computers for personal use.
7. Who was "Bluetooth" named after?
"Bluetooth" was the code name used by Ericsson Electronics to honor a Danish King, Herald Blatand (940 - 985ce.) It is rumored that the king got his name from the fact that he had black hair which is unusual for a Viking, but also because he enjoyed 'blueberries' so much that it caused his molars to be tainted blue.
8. Enterprice Information Portal (9EIPs): Corporate portals control access to company information and business processes based on each user's personal profile.
9. Four ways to use FTP:
a. Anonymous FTP are Public FTP sites where anyone can log onto varies websites using "Anonymous" as their user name.
b. Private FTP are websites operated by a private company for its employee's use and that restricts access to authorized users, who must enter a unique user name and password.
c. Command Line Interface provides a non-graphical interface in which you can enter commands to use FTP and the "Command Prompt" window. You than enter a series of commands to log on to the FTP site and download and upload your files.
d. FTP Client is a program that offers an easy-to-use graphical user interface containing menu commands and toolbar shortcuts. The program is genrally a function of any Windows Explorer, or similiar web browser.
10. Shopping Aggregator: Sometimes called a "Shopping Bot" has computer programs that search the web and build an index or database. A user enters keywords or phrases, the program searches its datbase to find the product that matches the search. Two types of shopping bots are, NexTag.com and MySimon.com.
11. MACaddress: A unique physical address assigned to every node (device) on a network such as a network interface card (NIC) by the manufacturer.
12. Hub: Is an inexpensive hardware device used to connect multiple nodes on the same network such as a Peer to Peer (P2P) local access network LAN.
13. Passive Hub: Is a node (device) that cannot determine how to direct a packet. The hardware device simply sends the same signal to all nodes or segment which it is connected to.
14. Intelligent Hub: This type of hardware device is design to perform a variety of tasks, such as filtering, or permitting a networks traffic to be monitored by an administrator.
15. Bridge: Basically is an intelligent connectivity device (node) with one input and one output port that connects two segments on the same LAN or two seperate local access network.
16. Port: An opening in a hardware device that is used to connect another device (node).
17. Static Routing: Is primarily controlled by an administrator who routes packets over specific paths between nodes.
18. Dynamic Routing: Allows a router to determine the best route between two nodes (device) automatically and than store the information in a "routing table".
19. Network Interface Card (NIC): Is an internal expansion card that enables a computer or other devices to access a network.
20. Data Switches: An intelligent device that also interpets MAC addresses and filters and forwards packets to other network segments. A data switch has multiple ports, with each port acting as a bridge.
21. Firewall: Is a combination of hardware and software that filters traffic between private networks or between private networks and public networks by blocking incoming and outgoing traffic using a predetermined set of rules established by an administrator. The most common types of firewall is a "Packet-Filtering Firewall" or "Proxy Server".
22. War Driver: The act of searching for WI-FI wireless networks by a person in motion using a portable computer or PDA. Software for War Driving is freely available on the internet.
23. Hop: Forwarding a packet to the next internet router. The more hops, the longer it takes for data to go from the sending computer to the destination computer.
24. Intenet Routers: Are intelligent hardware devices with multiple ports. Unlike a data switch, a router is a much more powerful unit. Routers are in fact "Specialized Computers" that can connect to LAN segments, or multiple LANs and WLANs. All transmit at differnt speeds and use different protocals.
25. Tracert: Traces hops from one computer to another computer over the internet. "Tracert Utility" can be used ro test the path to a - destination internet - site and check for any problems.
26. Gateways: A hardware device or software that runs on a mainframe computer, server, an individual workstation, or a router. They are used to connect two or more networks or network segments that use different packet formatting, communications protocal, and different access methods. Gateways also translate packets.
27. Peer to Peer Network: allows files to be transferred between individual PCs located on the same LAN or between individual PCs connected to the internet. P2P file sharing networks allow the user to share material such as music, video, movies and software. Unfortunately the abuse of protected copyright laws and piracy have made a negative impact on the use of P2P networks.
28. The ability of a Client/Server LAN to support shared data storage, provide network maintenance tool, and promote more efficient data backup's, offers an advantage over P2P LANs. With extensive security features built into a client/server network operating system it provides yet another advantage over P2P networks.
29. Please see reverse side of homework printout for drawing of three network topolgies and access method that each have.
30. Denial of Service Attack(DDoS): Involves sending a continuous stream of server requests that ultimately overloads a server's capacity to respond. Basically they are virus and malware program attacks launched by arrogant student or by criminals attempting to extort businesses, or seeking revenge.
1. Cyberbank: A virtual bank that has no physical facilities and offers products and services solely on the internet.
2. Brick and Click: A business that allows customers to conduct business or complete transactions at a physical location as well as online at a web site.
3. Brick and Mortor: The old traditional way of conducting a business transaction, primarily in person at a physcial location, over the phone, or using paper-based transactions.
4. Sticky Website: An interactive website that users visit often and browse for long periods of time.
5.Drilling Down: A process where the user moves from categories to sub-categories, to a useful link and finally, through to the website. One can say it is like leaving a breadcrumb trail that shows the hiearchal arrangement of the users previous links.
6. Cyberslacking: A form of abuse of business computers by employees; whereas they misuse the company computers for personal use.
7. Who was "Bluetooth" named after?
"Bluetooth" was the code name used by Ericsson Electronics to honor a Danish King, Herald Blatand (940 - 985ce.) It is rumored that the king got his name from the fact that he had black hair which is unusual for a Viking, but also because he enjoyed 'blueberries' so much that it caused his molars to be tainted blue.
8. Enterprice Information Portal (9EIPs): Corporate portals control access to company information and business processes based on each user's personal profile.
9. Four ways to use FTP:
a. Anonymous FTP are Public FTP sites where anyone can log onto varies websites using "Anonymous" as their user name.
b. Private FTP are websites operated by a private company for its employee's use and that restricts access to authorized users, who must enter a unique user name and password.
c. Command Line Interface provides a non-graphical interface in which you can enter commands to use FTP and the "Command Prompt" window. You than enter a series of commands to log on to the FTP site and download and upload your files.
d. FTP Client is a program that offers an easy-to-use graphical user interface containing menu commands and toolbar shortcuts. The program is genrally a function of any Windows Explorer, or similiar web browser.
10. Shopping Aggregator: Sometimes called a "Shopping Bot" has computer programs that search the web and build an index or database. A user enters keywords or phrases, the program searches its datbase to find the product that matches the search. Two types of shopping bots are, NexTag.com and MySimon.com.
11. MACaddress: A unique physical address assigned to every node (device) on a network such as a network interface card (NIC) by the manufacturer.
12. Hub: Is an inexpensive hardware device used to connect multiple nodes on the same network such as a Peer to Peer (P2P) local access network LAN.
13. Passive Hub: Is a node (device) that cannot determine how to direct a packet. The hardware device simply sends the same signal to all nodes or segment which it is connected to.
14. Intelligent Hub: This type of hardware device is design to perform a variety of tasks, such as filtering, or permitting a networks traffic to be monitored by an administrator.
15. Bridge: Basically is an intelligent connectivity device (node) with one input and one output port that connects two segments on the same LAN or two seperate local access network.
16. Port: An opening in a hardware device that is used to connect another device (node).
17. Static Routing: Is primarily controlled by an administrator who routes packets over specific paths between nodes.
18. Dynamic Routing: Allows a router to determine the best route between two nodes (device) automatically and than store the information in a "routing table".
19. Network Interface Card (NIC): Is an internal expansion card that enables a computer or other devices to access a network.
20. Data Switches: An intelligent device that also interpets MAC addresses and filters and forwards packets to other network segments. A data switch has multiple ports, with each port acting as a bridge.
21. Firewall: Is a combination of hardware and software that filters traffic between private networks or between private networks and public networks by blocking incoming and outgoing traffic using a predetermined set of rules established by an administrator. The most common types of firewall is a "Packet-Filtering Firewall" or "Proxy Server".
22. War Driver: The act of searching for WI-FI wireless networks by a person in motion using a portable computer or PDA. Software for War Driving is freely available on the internet.
23. Hop: Forwarding a packet to the next internet router. The more hops, the longer it takes for data to go from the sending computer to the destination computer.
24. Intenet Routers: Are intelligent hardware devices with multiple ports. Unlike a data switch, a router is a much more powerful unit. Routers are in fact "Specialized Computers" that can connect to LAN segments, or multiple LANs and WLANs. All transmit at differnt speeds and use different protocals.
25. Tracert: Traces hops from one computer to another computer over the internet. "Tracert Utility" can be used ro test the path to a - destination internet - site and check for any problems.
26. Gateways: A hardware device or software that runs on a mainframe computer, server, an individual workstation, or a router. They are used to connect two or more networks or network segments that use different packet formatting, communications protocal, and different access methods. Gateways also translate packets.
27. Peer to Peer Network: allows files to be transferred between individual PCs located on the same LAN or between individual PCs connected to the internet. P2P file sharing networks allow the user to share material such as music, video, movies and software. Unfortunately the abuse of protected copyright laws and piracy have made a negative impact on the use of P2P networks.
28. The ability of a Client/Server LAN to support shared data storage, provide network maintenance tool, and promote more efficient data backup's, offers an advantage over P2P LANs. With extensive security features built into a client/server network operating system it provides yet another advantage over P2P networks.
29. Please see reverse side of homework printout for drawing of three network topolgies and access method that each have.
30. Denial of Service Attack(DDoS): Involves sending a continuous stream of server requests that ultimately overloads a server's capacity to respond. Basically they are virus and malware program attacks launched by arrogant student or by criminals attempting to extort businesses, or seeking revenge.
Thursday, December 10, 2009
Define: Cloud Computing/Ch.6/ITcis101/name 5 hackers
Cloud computing is an emerging technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access.
Basically it allows interney users to customize how they recieve and pay fo web services. By centralizing the storage, memory, processing, and bandwith this technology allows for much more efficient computing. Cloud computing can be broken down into three segments: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Each segment serves a different purpose and offers different products for businesses and individuals throughout the world.
Reference: Google Search.com - Wikivest.com
Name Three Well Known Hackers
1. Kevin Mitnic
2. Robert Tappan Morries
3. Adrian Lamos
4. Jonathan James
5. Kevin Poulsen
Reference: Whois.com
Basically it allows interney users to customize how they recieve and pay fo web services. By centralizing the storage, memory, processing, and bandwith this technology allows for much more efficient computing. Cloud computing can be broken down into three segments: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Each segment serves a different purpose and offers different products for businesses and individuals throughout the world.
Reference: Google Search.com - Wikivest.com
Name Three Well Known Hackers
1. Kevin Mitnic
2. Robert Tappan Morries
3. Adrian Lamos
4. Jonathan James
5. Kevin Poulsen
Reference: Whois.com
Thursday, December 3, 2009
Web Page Content Evaluation: Lyle Zapato
Who is Lyle Zapato? After careful evaluation of his website and an extensive research into his background I began to realize that the character is a fetishes creation from some unknown person or persons. The website boosts to be a site for paranormal or unusual wildlife,but to me it is a site for those who exist in a paranoid state of mind. I will try to give you a brief description (if possible) of this person and his websites intentions.
According to several search queries Lyle Zapato is the author of this website. The E-mail address (lyle@zapatopi.net) is a documented web address, but it cannot be access or has been blocked (flaged).
His qualifications for the most part claims that he is a Washigton base cartoonist and publisher. This of course could not be confirmed. As far as I learned he has no experience as a wildlife expert or activist. Of course his homepage claims that he has an MA in psychothermo dynamics from Keninic University, but this information too is phoney. So this character - I will call him that because that is all that it is - cannot be considered an expert on anything. I researched for any other information on this character, but only stumbled on links that had complaints or negative comments about him and the webpage.
The publisher of the webpage is listed as "Osama Haliburton" and that it was published on October 10th, 2007. Again the publisher also is a fraudulent character. I couldn't even find a website for this publisher. Now according to the publishers stated purpose - taking note that this is all a fruad - it is a source for conspiracy theories and other maligned diversions. This statement can be considered an appropiate statement since that is what the webpage conveys. Other sources claim that this publisher, as I stated earlier is a phoney. I did not find any current updates on the page
The realibility of the webpage is not well documented and could not be substantuated by any expert or professional institution. There were no bibliography or reliable sources to confirm his claims on the supposed "Tree Octupus". The only people I can think of that would link to such a site are probably conspiracy theorist or people with paranoia problems. I think that the page was design for entertainment purposes and should not be taken seriously.
In conclusion I would warn anyone who enters this site to not take its contents seriously because it is a phoney website. Do Not Trust It!
References:
http://info.poland.com/
http://hoaxbusters.com/
http://hoaxslayer.com/
According to several search queries Lyle Zapato is the author of this website. The E-mail address (lyle@zapatopi.net) is a documented web address, but it cannot be access or has been blocked (flaged).
His qualifications for the most part claims that he is a Washigton base cartoonist and publisher. This of course could not be confirmed. As far as I learned he has no experience as a wildlife expert or activist. Of course his homepage claims that he has an MA in psychothermo dynamics from Keninic University, but this information too is phoney. So this character - I will call him that because that is all that it is - cannot be considered an expert on anything. I researched for any other information on this character, but only stumbled on links that had complaints or negative comments about him and the webpage.
The publisher of the webpage is listed as "Osama Haliburton" and that it was published on October 10th, 2007. Again the publisher also is a fraudulent character. I couldn't even find a website for this publisher. Now according to the publishers stated purpose - taking note that this is all a fruad - it is a source for conspiracy theories and other maligned diversions. This statement can be considered an appropiate statement since that is what the webpage conveys. Other sources claim that this publisher, as I stated earlier is a phoney. I did not find any current updates on the page
The realibility of the webpage is not well documented and could not be substantuated by any expert or professional institution. There were no bibliography or reliable sources to confirm his claims on the supposed "Tree Octupus". The only people I can think of that would link to such a site are probably conspiracy theorist or people with paranoia problems. I think that the page was design for entertainment purposes and should not be taken seriously.
In conclusion I would warn anyone who enters this site to not take its contents seriously because it is a phoney website. Do Not Trust It!
References:
http://info.poland.com/
http://hoaxbusters.com/
http://hoaxslayer.com/
Tuesday, December 1, 2009
Research on computer viruses
Computer viruses like biological viruses seem to be an intricate part of our everyday life. No matter how much we try to eradicate them they seem to always hang around (covertly). Since 1949 theories for self-replicating programs have been developed in one form or another.In fact the first computers to experience some form of a virus were the UNIVAC 1108 and the IBM 360/370 units. The viruses that infected these two earlier computers were called "Pervading Animal" and "The Christmas Tree". These are probably the very first during the late 1960s and early 1970s. Others Like ' Brian - Vienna - Cascade and PingPong are consider the first, but this too is debated til this day. It was probably during the 1980s when the major public was exposed to virus threats.The "Apple 1,2,3" affected some computer programs by modifying them in such a way as to include a form of replication. A virus that was found on the Apple II operating system spread via pirated computer games. In 1986, two programmers named Basit and Amjad replaced the executable code in the 'boot' sector of a floppy disk with their own code. This code, designed to infect each 360kb floppy that was accessed on any hard drive had the copyright 'Brian' on its label. It is also considered to be the first "bootable style" virus. Although most virus programs were devoloped by students trying to show their skills or seeking admiration from their fellow students and teachers, computer viruses are more often originating from cyber-criminals. These cyber-criminals design viruses and worms to steal or copy personal and sensitive data for financial gain. Most of these viruses tend to access personal computers via the internets (e-mail), .exe, .com, and other unprotected programs. In 1987 the 'Lehiegh' was one of the first file viruses to be unleached. This virus infected the command (.com) files.
While researching viruses and worms I came to understand the differences in the level of dangers they posed to any computer. Even the most powerful supercomputers are exposed to infections. I also learned that the most dangerous of these viruses are "Polymorphic viruses. Trojan horses and Worms are forms of polymorphic virial programs. They attempt to simulate exciting programs or softwares.For example, Trojan horses usually infect e-mail software via attachments or spamwares. A Macro virus, oftened scripted into common applications program, such as Word or Exel, is spread by infecting documents and spreadsheets. On the otherhand a computer worm is a self replicating computer program that uses a network to send copies of itself to other computers on the network without any user intervention. Unlike a virus it doesn't have to attach itself to an existing program. One of the first computer worms written by a Cornell University student, Robert Tappan Morris, was in 1986. It was launched on November 2, 1988 from MIT. Today a variety of antivirus software programs are available free online or can be purchased at any computer and electronics stores.The best way to protect your computer is to always have an up-to-date antivirus or malware program running. Some of the most trusted antivirus programs are: Norton Antivirus - AVG - McAfee - Ad-ware - ClamWin and Avast (free).
References:
Wikipedia.com/internet/virus-creation./34dffr/html
Support.microsoft.com/security/antivirus/indicator.aspx
Washingtonpost.com/wp-dyn/article/a50636-2002jun26.html
Dictionary.reference.com/browse/computer +virus?ss=0
While researching viruses and worms I came to understand the differences in the level of dangers they posed to any computer. Even the most powerful supercomputers are exposed to infections. I also learned that the most dangerous of these viruses are "Polymorphic viruses. Trojan horses and Worms are forms of polymorphic virial programs. They attempt to simulate exciting programs or softwares.For example, Trojan horses usually infect e-mail software via attachments or spamwares. A Macro virus, oftened scripted into common applications program, such as Word or Exel, is spread by infecting documents and spreadsheets. On the otherhand a computer worm is a self replicating computer program that uses a network to send copies of itself to other computers on the network without any user intervention. Unlike a virus it doesn't have to attach itself to an existing program. One of the first computer worms written by a Cornell University student, Robert Tappan Morris, was in 1986. It was launched on November 2, 1988 from MIT. Today a variety of antivirus software programs are available free online or can be purchased at any computer and electronics stores.The best way to protect your computer is to always have an up-to-date antivirus or malware program running. Some of the most trusted antivirus programs are: Norton Antivirus - AVG - McAfee - Ad-ware - ClamWin and Avast (free).
References:
Wikipedia.com/internet/virus-creation./34dffr/html
Support.microsoft.com/security/antivirus/indicator.aspx
Washingtonpost.com/wp-dyn/article/a50636-2002jun26.html
Dictionary.reference.com/browse/computer +virus?ss=0
Subscribe to:
Posts (Atom)