SEC602 Lab 2

Basic explanations of the Lab

To give us an idea how to setup anti-malware program under window defender and how to perform a virus scan with that, also try some features on the internet explorer to increase our pc security level.

Ans 1 Discuss when you may need to use the Windows Defender feature from the lab

We use the windows Defender Quick for a full or Custom Scan virus and spyware on the PC, also we can use it to update the virus database.

If your computer get infected by a computer virus, you may get an unexpected onscreen  ads pop-up, then this the time to have a virus scan on you PC. Before you get the PC scan, an updated virus database is required because updated virus database contain latest list of viruses and its behavior of known virus.

Ans 2 Discuss a scenario when you may need to use the Online Anti-Malware Scanner 

Malware is an application and code which can damage and disrupt our PC. There are several types of malware such as coin miner, exploits, exploit kits phishing, worms ets.

The most comment sign for a malware infection is the computer is slowing down. There are several reasons of the computer slow down, such as not enough system memory or hard disk space, or open too many tabs on the browser. If you checked all these possible causes and everything is work well and the computer still very slow, it is the time the have an online anti-Malware scan to make sure your computer is clean.

Ans 3 Select a feature Internet Explorer Browser Security from the lab and discuss the reason it is required.

There are so many security tools provided by Internet Explore Browser for you optimize your Browser security lever.

Such as:

  • Tracking protection
  • Pop-up Blocker
  • SmartScreen Filter
  • ActiveX Filtering
  • InPrivate Browsing

One of the most useful function is Pop-up Blocker which can prevents pop-up windows showing on your screen.

Pop-up window is a widow open automatically without receiving any instruction by the user. Company use pop-up as their marketing tool. Sometime showing some useful information for the use, however, most of the time are annoying and take up all the screen which block your view to read the previous website.

This is the reason why browser provide a Pop-up blocker and allow user to adjust the setting.

In the Pop-up blocker, under Medium blocking level, most pop-up will be blocked atomically, but sometimes you would like to allow some pop-up form specific web site. At the Pop-up Blocker Settings, you can add the address of website to the list which is the exception. Which means that if you do that, most of the pop-up will be blocked except the website on the list.

SEC602 Lab1

Basic explanations of the Lab

The aim of the lab is try to log in to the social media website, MyBook, and collect personal information form our target Phillip Nomad. And then use these information to plan an attack.

Ans 1 Summaries the key information gathered from MyBook

Form the front page we know that

1.     Phillip is married

2.     He has two close friends: John and Alexis (who are close enough to Phillip to comment on his pictures)

3.     Phillips car has broken down

From the about page we know that

1.     Personal details: mobile no., date of birth

2.     He studies in oxford UK

3.     Work in Costa, HP and Google

4.     possible home location based in Kingston

From the Album page we know that

1.     Philips has him listed as a creative Director which imply that he may have access to important resources and information

2.     his passwords likely provide him with Admin level or root access to domains or servers full of data which in situations like corporate espionage could be very lucrative.

3.     The album photo suggested that he enjoys going to raves, scenic views 

4.     The pug dog photo also useful, because a classic question asked in secure questions is “what is/was the name of your first pet/dog/cat?”

From friend page we know that

1.     Sophia Lee is at Oxford and its possible they attended University at the same as each other.

2.     Robert Cook, photographer, might have more interesting photos of Phillips life, providing more insist into the type of person he is

3.     Linda who is also a Software Engineer that might work with Phillip, 

4.     James who is a CEO of a company called IT Farm, he could have a working relationship 

Ans 2: What are the risks of using a social networking platform?

Almost everybody is using social networking platform and we will put so much personal information on them, if the people who don’t protect their personal well, it is possible to be hacked by different way.

For example, if we put so much personal on the social network, such as date of birth, education, work place, work history, photos and hobbies on public profile, the attacker can collect that information easily without your permission and use that to organize an attack to hack your computer.

Ans 3: Consider how the information gathered can be leveraged to attack an organization?

After collecting some personal information form the person, like Phillip who are working in Google now, the possible attack target would be

1.      IT Farm

2.      Google

To complete the attack, we could:

1.      First, as we know the mobile number, we can call him serval time act as a guy from the car repair shop to get more information.

2.      Second, need to build trust by getting the permission of friend request. We can use the information from the album photo, there are photos of the sea, concert and wedding, so we can portent a friend he met from the beach also meet him at the wedding.

3.      Third, we can act of pretending to be another person such as a coworker or college friend (impersonation). We know that Philips have some relationship with IT Farm, we can pretend work for IT Farm and gain friendship with Philips.4.      We know the address of Philips and we can Dumpster Diving his stuff, maybe we could find some important information such as meeting notes, appointments and work notes in the dumpster.

Res701 Blog 1 What is research?

What do you think ‘research is?

Research is a systematic method to find out something/something new, solve a problem or solve a problem.

In a normal research procedure, we can divide into three part: Planning, doing and sharing,

In the planning phase, we need to think carefully what the aim of the research is. Such as having a partial area of interest and try to know what is the propose of the research. Maybe you need to discover something new or solve a problem. Then, collection information regarding the question you want to answer. Gather as much info as you can and find out which one is useable and make the foundation knowledge of your research. Finally, choosing how to complete the research, different area may use different approach such as survey, observations or experiment etc.

In the doing phase, we need to do what you have planned, such as the experiment and collect the result. After that, analyze the result to see whether it fit your expectation or not and try to summaries them and make a conclusion.

Finally, share your finding to the public, such as your personal blog, newspaper or academic journal.

Do you think you will ever need research skills?

Research skills is important for everyone because these skills can the research field can be applied to daily life. For example, if we buy a second car, rent a house or select your career. So, we can:

  • identify problems or possible risk.
  • Collect information in a organize way
  • Evaluate the information collated which helping to solve the problem

What do you think a research journal is and who is it written for?

Research journal is publication contain academic research result. Academic journals serve as permanent and transparent forums for the presentation, scrutiny and discussion of research. The purpose of these journals are:

The target of the research journal is the people who what to know the knowledge of a specific area. To find out what other research done, learn for them and plan your own research project.

What is plagiarism?

For my understanding of plagiarism is copying other people work, writing or event ideas without giving reference and saying that is your own work.

According to the Merriam-Webster online dictionary, to “plagiarize” means:

  • to steal and pass off (the ideas or words of another) as one’s own
  • to use (another’s production) without crediting the source
  • to commit literary theft
  • to present as new and original an idea or product derived from an existing source

Why is it important to avoid it?

Plagiarism like stealing. It is wrong also affecting the overall research atmosphere. If everybody copying other people work and get credit, nobody will do their own research anymore. It will hold the progress of our technology improvement.

As a student, if you plagiarize other people work, not only you will lost the mark and fail the course, the people who give you the material will also lost the mark.

So, we need to protect myself also the hold research atmosphere to make our world better.

Introduce Yourself (Example Post)

This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right.

You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click the “New Post” button, and tell us why you’re here.

Why do this?

  • Because it gives new readers context. What are you about? Why should they read your blog?
  • Because it will help you focus you own ideas about your blog and what you’d like to do with it.

The post can be short or long, a personal intro to your life or a bloggy mission statement, a manifesto for the future or a simple outline of your the types of things you hope to publish.

To help you get started, here are a few questions:

  • Why are you blogging publicly, rather than keeping a personal journal?
  • What topics do you think you’ll write about?
  • Who would you love to connect with via your blog?
  • If you blog successfully throughout the next year, what would you hope to have accomplished?

You’re not locked into any of this; one of the wonderful things about blogs is how they constantly evolve as we learn, grow, and interact with one another — but it’s good to know where and why you started, and articulating your goals may just give you a few other post ideas.

Can’t think how to get started? Just write the first thing that pops into your head. Anne Lamott, author of a book on writing we love, says that you need to give yourself permission to write a “crappy first draft”. Anne makes a great point — just start writing, and worry about editing it later.

When you’re ready to publish, give your post three to five tags that describe your blog’s focus — writing, photography, fiction, parenting, food, cars, movies, sports, whatever. These tags will help others who care about your topics find you in the Reader. Make sure one of the tags is “zerotohero,” so other new bloggers can find you, too.

Design a site like this with WordPress.com
Get started