Skip to main content

Posts

Showing posts from September, 2024

Project management methodologies

  Project management methodologies Agile This uses an iterative approach to delivering a project throughout its entire life cycle. This means that this is a very adaptable methodology and it has multiple frame works that can be used and the one that is selected depends on Size of organisation Structure of team Resource availability Stakeholder requirements Each of these frame works have their own pros and cons, which means that although it may work for one team it may not work for another team as effectively.                  Types of frame works Scrum - Scrum is an Agile framework used to manage complex projects. It involves: Roles: Product Owner: Manages the product backlog and ensures value delivery. Scrum Master: Facilitates the process and removes obstacles. Development Team: Delivers the product increment in a self-organizing manner. Artifacts: Product ...

Types of network adapters in virtual box

  Types of network adapters in VirtualBox In VirtualBox there’s multiple types of network adapters that can be used to configure virtual machines for different networking needs. Down below will give you a brief overview of each type. NAT (network address translation) The VM is placed behind a VirtualBox-managed router. This allows the VM to access the external network via the networks host’s IP, but the VM itself remains invisible to the outside. Its most suitable for simple internet access with minimal configuration NAT network This is like NAT, but it allows multiple VM’s to communicate with each other in the same NAT network all while sharing the host’s internet connection. Its commonly used when you want to simulate a small, isolated network of VM’s that can also access the internet. Bridged adapter This VM is connected directly to the physical network as if it is a separate device, it also receives its own IP address from the same network as the host. This is ide...

CAT cables

  CAT cables Theres many types of CAT cables, and they are commonly used for Ethernet and other networking purposes.   Types Theres 5 main types of CAT cables: ·           CAT5e (Category 5e): This is an enhanced version of the CAT5 cable, offering improved performance and support for higher data transfer rates. It is suitable for most home and small business networking needs. ·           CAT6 (Category 6): CAT6 cables provide even higher data transfer rates and reduced crosstalk compared to CAT5e. They are commonly used in professional installations and are suitable for gigabit Ethernet and some 10-gigabit applications. ·           CAT6a (Category 6a): The "a" stands for "augmented." CAT6a cables are an enhanced version of CAT6, offering even higher data transfer rates and better performance, especially in terms of crosstalk and signal quality...

VLAN

  VLAN This is our set up, the two computers on the side are part of the Preminger VLAN. theses computers can interact with each other but not with the other 2 computers on the Jafar VLAN. Below is the step by step process of how these two VLAN's were created. I manually added the VLAN's to the data base as seen below.  Network table Device name IP address Subnet mask Default gateway PC 0 198.162.10.1 255.255.255.0 N/A PC 1 198.162.10.2 255.255.255.0 N/A PC 2 198.162.10.3 255.255.255.0 N/A PC 3 198.162.10.4 255.255.255.0 N/A

CIA

  CIA Confidentiality, Integrity, and Availability, often referred to as the CIA triad, are three core principles of information security: Confidentiality: ·           Definition: Ensuring that information is only accessible to authorized individuals or entities. ·           Objective: Protecting sensitive data from unauthorized access or disclosure.   Integrity: ·           Definition: Ensuring the accuracy, reliability, and trustworthiness of data throughout its lifecycle. ·           Objective: Preventing unauthorized or accidental modification, deletion, or alteration of data.   Availability: ·           Definition: Ensuring that information and systems are accessible and usable when needed by authorized users. ·      ...

Algorithms

  Algorithms Objective: Write a python script to automate the daily sending of email messages. The script should generate a daily message and send it via email. import smtplib from email.mime.multipart import MIMEMultipart from email.mime.text import MIMEText import schedule import time # Function to send email def send_email ( subject , body , to_email ):     # email credentials     sender_email = "#for security reasons this will be hidden"     sender_password = " #for security reasons this will be hidden "       # Create message     message = MIMEMultipart()     message[ "From" ] = sender_email     message[ "To" ] = to_email     message[ "Subject" ] = subject     message.attach(MIMEText(body, "plain" ))     # Connect to the SMTP server (Gmail in this case)     with smtplib.SMTP( "smtp.gmail.com" , 587 ) as server:         server....

Data breach

  Data breach What's the impact of a data breach on clients and customers?   Online retailers gather a vast array of data about their customers to enhance user experience, personalize marketing, and optimize operations. This data typically includes personal information like names, addresses, and payment details, as well as transaction history, browsing behaviour, and preferences. Retailers also employ analytics to derive insights for targeted advertising and improved product recommendations.   In the event of a data breach, where this sensitive information is compromised, the impact on both the retailer and customers can be severe. Customers may face identity theft, financial fraud, or unauthorized access to their accounts. For the retailer, the breach can lead to reputational damage, loss of customer trust, and legal consequences. Various legislations worldwide govern the protection of consumer data, like the General Data Protection Regulation (GDPR), and similar laws ...

Malware

  Malware Malware, short for malicious software, refers to a broad category of software specifically designed to harm or exploit computer systems and networks. It encompasses various types such as viruses, worms, trojans, ransomware, and spyware, each with unique functionalities aimed at unauthorized access, data theft, or system disruption. Malware can infiltrate devices through infected files, email attachments, or compromised websites, posing a significant threat to the security and privacy of individuals and organizations alike.     Adware Adware generates revenue for its author. Its also known as advertising-supported software. Adware covers any software package that automatically shows adverts. It may also be in the user interface of a software package or on an instillation screen. Adware by itself is harmless but sometimes it can include spyware such as key loggers.     Key logger These can take two forms. They can either be legitimately installed ...