This week we learned about Computer Security, Ethics, and Privacy. Computer security is an important issue and one that many people do not take seriously enough. There are different types of security risks that a computer user should be aware of. These include loss of data due to hardware loss such as your laptop or phone getting stolen, preventing yourself from hacker attacks, viruses, and Phishing and also email and message security.
People create viruses for a number of reasons. Some are to make money by giving a user the virus then selling that same person a removal tool. Others make viruses to get credit on the internet, for bragging rights, or just because they can. It is very important that users protect themselves by running a anti virus program on their computer, installing a router and closing off vulnerable ports on their router.
A Phishing scam is when someone makes a fake email or website which looks and appears real in all ways except it is not. Its only purpose it to get user information. Users are especially vulnerable when connecting to open wireless networks in which their network data can more easily be redirected or captured.
We also learned about software piracy. Piracy is a breach in contract of the EULA in which case the user usually illegally copies the data and may make money distributing it. It is important to know that software piracy costs companies a lot of money and raises prices for normal paying users. It is illegal and pirates face jail time for their actions. It is also important never to reply to SPAM. Spammers send out random emails to addresses and if you reply you are showing them that you are a real person and you will continue to get bombarded by even more SPAM. It is recommended to use a free email which you don't care about to sign up for services which may sell or use your email.
That's it for this week. :)
Sunday, November 21, 2010
Secure Email Project
Screen capture below showing both project emails from the Professor.
Click on image to enlarge.
For the secure email project we were required to find an article that talked about a company and secure email. The article I found was on the Wall Street Journal. The article can be found here:
http://online.wsj.com/article/SB10001424052748703628204575618620657780244.html
This article talked about how Deutsche Post AG, a German company and Europe's largest postal service, is trying to get consumers to use online mail instead of conventional paper. Although there are many free email services such as Gmail and Yahoo the company is trying to sell their "E-Post letter" service on the grounds that it is very secure email. The mailbox is free but it costs 75 USD cents to send a letter. Currently 1 million people have signed up for the service.
To test the security of their E-Post letter system Deutsche Post invited "teams of hackers, academics and security experts" to try and break into their system. If any problems are found they are immediately fixed without the public even knowing. Deutsche Post says that so far 100 large companies have signed up for the service for activities such as "employee pay stubs and sending legally binding information."
Personally I think that this is a very interesting article. It is shocking to me in a way that companies and individuals would pay so much for a service but it also shows the value of secure email at the same time.
Click on image to enlarge.
For the secure email project we were required to find an article that talked about a company and secure email. The article I found was on the Wall Street Journal. The article can be found here:
http://online.wsj.com/article/SB10001424052748703628204575618620657780244.html
This article talked about how Deutsche Post AG, a German company and Europe's largest postal service, is trying to get consumers to use online mail instead of conventional paper. Although there are many free email services such as Gmail and Yahoo the company is trying to sell their "E-Post letter" service on the grounds that it is very secure email. The mailbox is free but it costs 75 USD cents to send a letter. Currently 1 million people have signed up for the service.
To test the security of their E-Post letter system Deutsche Post invited "teams of hackers, academics and security experts" to try and break into their system. If any problems are found they are immediately fixed without the public even knowing. Deutsche Post says that so far 100 large companies have signed up for the service for activities such as "employee pay stubs and sending legally binding information."
Personally I think that this is a very interesting article. It is shocking to me in a way that companies and individuals would pay so much for a service but it also shows the value of secure email at the same time.
Sunday, November 14, 2010
Week 12: Clear
This week we learned about networks and electronic communication. I had an understanding of networks before this week and therefore I my understanding of the topic is clear.
In order for any node (network attached device) to communicate with the outside world it has to have a NIC card or Network Interface Controller.
There are a few different types of networks. A PAN or Personal Area Network is the smallest and can be composed of up to 6 nodes. A LAN or Local Area Network is slightly larger and should be a home, building or office. A MAN is a Metropolitan area network and is larger then LAN. It covers a city or another large area. A WAN stands for Wide Area Network and is the largest. An example would be multiple cities or even larger still. The Internet is an example of a WAN.
There are two basic types of network architecture. The most common is client / server. This is when a client ( perhaps a personal computer ) talks to a server. The server serves the data and gives it back to the client. The other types of basic but common network architecture is peer to peer. This is when a personal computer talks directly to another personal computer. An example of this could be the famous Kazaa network.
In combination with the networks that were previously mentioned it should also be noted that a network can be wired or wireless. Most wireless networks are LAN and fairly small. One of the first cities and therefore MAN to go wireless is San Francisco. Here Internet is completely free and wireless.
Thats it for this week!
In order for any node (network attached device) to communicate with the outside world it has to have a NIC card or Network Interface Controller.
There are a few different types of networks. A PAN or Personal Area Network is the smallest and can be composed of up to 6 nodes. A LAN or Local Area Network is slightly larger and should be a home, building or office. A MAN is a Metropolitan area network and is larger then LAN. It covers a city or another large area. A WAN stands for Wide Area Network and is the largest. An example would be multiple cities or even larger still. The Internet is an example of a WAN.
There are two basic types of network architecture. The most common is client / server. This is when a client ( perhaps a personal computer ) talks to a server. The server serves the data and gives it back to the client. The other types of basic but common network architecture is peer to peer. This is when a personal computer talks directly to another personal computer. An example of this could be the famous Kazaa network.
In combination with the networks that were previously mentioned it should also be noted that a network can be wired or wireless. Most wireless networks are LAN and fairly small. One of the first cities and therefore MAN to go wireless is San Francisco. Here Internet is completely free and wireless.
Thats it for this week!
Sunday, November 7, 2010
Week 11: Clear
This week we learned about Information Systems Development. At first this topic seemed really easy but I was surprised how much information there was to learn. Overall though I feel that I got a good understand of the material presented. I have a background as a programmer and this is in my opinion is closely related to system development.
There are five phases in the system development cycle; all of which are also used in programming. Planning, Analysis, Design, Implementation, and Operation, Support, and Security. It is important to understand these steps because without this you can not build on more material. Planning covers making, reviewing project requests, allocating resources, and forming a team. Planning is the most important step to me and I am glad that the lectures stressed the importance of this. Although it can take time, it really is necessary. Analysis consists of conducting an investigated and detailed analysis. Design consists of acquiring hardware/software and figuring out the details. I feel that I do not have the best grasp on design. One questions which I am unsure of is why you would be acquiring hardware if you have yet to figure out all the details? Perhaps I am misunderstand some detail here. The next step is Implementation is when stuff actually happens and is built. Lastly operation, support and security are very vital. Operation is basically maintenance. Supporting is monitoring to make sure its ok, and security is making sure the system is secure. Security is really important in my opinion and definitely ties in with previous lectures regarding physically where data is stored.
This week in the material was a lecture with Christine Schoaff who is a UF Systems Analyst. She gave an interesting presentation. It was easy to tell that she had a lot of experience working with people and managing them. She joked that her job was to nag people. I completely agree with her that if you do not plan ahead with all parties involved everything will fall through. This goes along with the fact that if she does a good job it will look like she is actually doing nothing. One of the topics which Schoaff talked about which I was not familiar with was making people feel good. I have never been a manger before and she talked about how it is important to make sure that everyone feels happy and accomplished at the end of the day. Schoaff said her job sometimes requires her to smile even at stupid idea. This make me think back to my job experiences as a worker and not a manager and question a few decisions managers made differently. I also enjoyed her comment on how workers are much less efficient late at night or under stress.
In some of the previous projects and group projects that I have been involved in I wish that I had of known the information presented here. It really is valuable to have a project manager in every group project. I think overall though the most important thing for all parties is thinking ahead and making logical decisions. I really enjoyed the material presented in this topic. I feel that in the future it will help me think more rigidly when faced with projects, groups and of course time! Until next week!
There are five phases in the system development cycle; all of which are also used in programming. Planning, Analysis, Design, Implementation, and Operation, Support, and Security. It is important to understand these steps because without this you can not build on more material. Planning covers making, reviewing project requests, allocating resources, and forming a team. Planning is the most important step to me and I am glad that the lectures stressed the importance of this. Although it can take time, it really is necessary. Analysis consists of conducting an investigated and detailed analysis. Design consists of acquiring hardware/software and figuring out the details. I feel that I do not have the best grasp on design. One questions which I am unsure of is why you would be acquiring hardware if you have yet to figure out all the details? Perhaps I am misunderstand some detail here. The next step is Implementation is when stuff actually happens and is built. Lastly operation, support and security are very vital. Operation is basically maintenance. Supporting is monitoring to make sure its ok, and security is making sure the system is secure. Security is really important in my opinion and definitely ties in with previous lectures regarding physically where data is stored.
This week in the material was a lecture with Christine Schoaff who is a UF Systems Analyst. She gave an interesting presentation. It was easy to tell that she had a lot of experience working with people and managing them. She joked that her job was to nag people. I completely agree with her that if you do not plan ahead with all parties involved everything will fall through. This goes along with the fact that if she does a good job it will look like she is actually doing nothing. One of the topics which Schoaff talked about which I was not familiar with was making people feel good. I have never been a manger before and she talked about how it is important to make sure that everyone feels happy and accomplished at the end of the day. Schoaff said her job sometimes requires her to smile even at stupid idea. This make me think back to my job experiences as a worker and not a manager and question a few decisions managers made differently. I also enjoyed her comment on how workers are much less efficient late at night or under stress.
In some of the previous projects and group projects that I have been involved in I wish that I had of known the information presented here. It really is valuable to have a project manager in every group project. I think overall though the most important thing for all parties is thinking ahead and making logical decisions. I really enjoyed the material presented in this topic. I feel that in the future it will help me think more rigidly when faced with projects, groups and of course time! Until next week!
Saturday, November 6, 2010
Database Project
This was an interesting and frustrating project. Before this project I was not comfortable or familiar with Access. Now I feel a lot more competent.
Through this project I leaned a number of new things. One of the easiest things that I did learn but had trouble with was renaming a table. I figured out you simply have to close it first. Importing data was not as easy as I thought it would be. I tried to use the text import feature multiple times but the data was not correctly inserted and errors would come up. I ended up making two new files. One for my own data and the other for the 1000 files. Then I just put them both into a new documents. I finally figured out that I needed to "Paste Append" instead of just "Paste", as this also caused me some problems too.
I learned that it is important to backup data. If you somehow delete or change the data type all data can be lost with no undo. I also learned how to create filters and sort data. It took me a long time to figure out how to lock a field in a form, but I finally did. One really useful thing I learned was how to create a report from a query.
I think that this database could be enhanced by creating more fields. Since this is a gym perhaps they could make a new table which could track workout routine.You could also have a weight loss table. Other information could be added such as how often a member visits. From the interpret-ability end of viewing the data perhaps Pivot Charts could be added. This would create fancier reports which are easier to read.
Through this project I leaned a number of new things. One of the easiest things that I did learn but had trouble with was renaming a table. I figured out you simply have to close it first. Importing data was not as easy as I thought it would be. I tried to use the text import feature multiple times but the data was not correctly inserted and errors would come up. I ended up making two new files. One for my own data and the other for the 1000 files. Then I just put them both into a new documents. I finally figured out that I needed to "Paste Append" instead of just "Paste", as this also caused me some problems too.
I learned that it is important to backup data. If you somehow delete or change the data type all data can be lost with no undo. I also learned how to create filters and sort data. It took me a long time to figure out how to lock a field in a form, but I finally did. One really useful thing I learned was how to create a report from a query.
I think that this database could be enhanced by creating more fields. Since this is a gym perhaps they could make a new table which could track workout routine.You could also have a weight loss table. Other information could be added such as how often a member visits. From the interpret-ability end of viewing the data perhaps Pivot Charts could be added. This would create fancier reports which are easier to read.
Subscribe to:
Posts (Atom)