Action Research is research methodology mainly used in education, it dissolve the barrier between the researcher and participants, in other word, the research actively involve in the situation and also conducting the research.. The process of action requires a cycle of steps to improve practice and taking action at the same time. “Action research isContinue reading “RES701 Blog Action Research”
Author Archives: Albert
RES701 Blog Different Sources of evidence
Computational thinking: Sources 1 Computational thinking – Wikipedia Search terms used: Use google by searching: Computational Thinking Sources Location: link from google URL: https://www.youtube.com/watch?v=qbnTZCj0ugI Sources Type: YouTube video Author: Paxton/Patterson Date: May 8, 2018 Credibly: 6/10. The Credibly is normal because not too many viewed and the sources in from YouTube Sources 2Continue reading “RES701 Blog Different Sources of evidence”
Lab 8 Understanding PKI Concepts
ANS1 What is the role of the Root CA and Subordinate CA in PKI? Public key infrastructure (PKI) is a two key encryption system for communication. All key is issued by a certificate authority (CA) and distributed to the user Root CA is stand for root certificate authority, who is a trusted party, their roleContinue reading “Lab 8 Understanding PKI Concepts”
Lab 7 Password cracking
Ans 1 Discuss how to use Cain & Abel to initiate a brute force attack. Cain & Abel is a software for cracking password in different system, such as windows, cisco etc. the software contains so many types of method to crack password, one of them is called Brute-force Attack. To perform brute force attack, userContinue reading “Lab 7 Password cracking”
Lab 5 Scanning and Remediating Vulnerabilities with OpenVAS
This lab gives us an overview of how to use software to perform a full system vulnerability check and try to fix this problems. Ans1 Investigate and discuss one of the SSL vulnerabilities found as a result of the OpenVAS scan that has a severity rating of 4 or higher. A severity rating of 4Continue reading “Lab 5 Scanning and Remediating Vulnerabilities with OpenVAS”
Lab 4: Network Vulnerabilities Part 2
Ans.1 Explain in your own words the DOS attack scenario. Denial of Service attacks (DOC) is a hacker using hacking software to denies service to other users or delaying the response time of the website, server or database. Hacker try to use up the resources of the network to complete attack. For example, use up theContinue reading “Lab 4: Network Vulnerabilities Part 2”
SEC602 Lab 6: Encryption and Hashing
Ans1 Discuss the use of MD5 hashes for software downloads. MD5 is an algorithm used for producing a fixed length character to make sure the data is correct during download. MD5 is not an encryption method but it is very usefully in data transfusing. In the example of software download, no matter the size ofContinue reading “SEC602 Lab 6: Encryption and Hashing”
RES701 Blog 3 Research Paradigms
The basic concept of research paradigms is a basic belief system include ontology and epistemology; both are the foundation of the research. Ontology means the nature of our beliefs about reality there are three main branches of ontology in research area, they are realism, constructivism and nominalism. Another important component of research paradigm is epistemology,Continue reading “RES701 Blog 3 Research Paradigms”
Res701 Blog 2 Ontology and Epistemology
Que1. What is ontology? How is it relevant to research? The means of ontology is the study of what exists, such as: what is real; what are we here for? studding the natural. For example, what is the fundamental part of the world and how they are related to each other. There are several ontologiesContinue reading “Res701 Blog 2 Ontology and Epistemology”
SEC602 Lab 3
Aim: In this lab, we are trying to perform a network footprinting and packet sniffing for discovering any useful information or of the target network. Que1. Summarise the information discovered in the Lab about the network topology. Network topology is layout of the network showing us how the nodes connecting with each other. We canContinue reading “SEC602 Lab 3”