Sunday, 17 March 2019

Cyber Security

The modern world evolves more rapidly than any age previous, we live in an age where everything is digital, and i mean everything. There are TVs, Thermostats and Lights for your home, are just some examples of devices that can be controlled via an app on your mobile phone. Therefore, Cyber Security awareness is essential in protecting yourself online.

The most common cyber attacks take place through individuals who are not very security conscious, or just don't feel that cyber crime will affect them as they don't have anything worth taking. However, this couldn't be further from the truth. There is nothing on Earth more valuable than an individuals identity.

Some of the most commonly used passwords from 2018 are as follows:

123456
Password
Password1
qwerty

Along with this short list of passwords, another common password type is close family relations or pets. The reason they aren't good passwords is because, anybody browsing a social media account could easily find out about the life of the person they were 'stalking' online. People often put pictures of their family with a label underneath depicting what is taking place in the photograph. In extension of that, if the people in the photo also have social media, it is possible to tag them, enabling information to be found out more easily.
When creating passwords for online accounts, they should consist of a mixture of uppercase and lowercase lettering, with punctuation as well. for example; 'Pass@word1.' or better still '.1drOw@ssap'.
*note* these are examples and 'password' in any form should never be used as a password for any system, ever.
The password, naturally, will need to be something that you can remember, as passwords should never, ever be written down. There have been known incidents of people writing down their new password and taping it to their monitor, meaning that anybody could just walk past their desk, type in the login credentials and gain unauthorised access with minimal effort. The threat is doubled if that person happens to have administrator privileges and can make substantial changes to the data on the device.
Nobody is impervious to making mistakes regarding cyber security, there were several incidents in the news a few years ago, where government officials had been carrying laptops on a train journey. The machine in question had unencrypted sensitive data and was accidentally left on the train.
Sensitive information could be anything from login details to a social media account all the way up to details regarding online banking accounts.
It only takes a few details to steal your identity, and the more they know, the easier it is to impersonate you.
A common attack used by hackers is a skill known as 'social engineering'. An example of where this attack would be used; Would be a hacker phoning up a company pretending to be an employee that had misplaced or forgotten their details. If the hacker is able to provide details about the system or has access to account details but not the password, the person on the phone could potentially be tricked into creating an account for them as an employee of the organisation. Whereby the hacker would have successfully gained access to a confidential system without raising any red flags. This would then provide them access to confidential company information which they then maybe able to edit or delete, or possibly copy that information and sell it on elsewhere, giving other companies a leading edge with classified insider knowledge.
Another common attack on organisations come from within the organisation itself. Employees have access to information on secure servers with their login credentials, and it wouldn't flag any systems when they access the data, as they are proper clearance to view that information.
Another type of attack is known as a DOS or Denial-of-Service attack. This is where the attacker seeks to make company resources unavailable by disrupting the services of machines connected to the internet.
A DOS attack can come in several forms, one of which includes; overloading memory buffers preventing the system from carrying out its normal function, effectively shutting it down until the attack ceases.
Another attack includes flooding the target with data packets, again rendering their system unusable until the attack subsides. this type of attack is only possible if the target has lower bandwidth than the perpetrator carrying out the attack.

I hope you have enjoyed this brief overview of Cyber Security. As a reminder, it is also important to change your passwords on a regular basis to keep all of your data secure, and NEVER tell your password to another person, no matter how much you trust them.
If you enjoyed this blog and would like to see any of the topics within it, covered in more detail or would like to know about something else related to cyber security, then please message me and I shall endeavour to cover it in my future blog posts.

Wednesday, 6 March 2019

Networking Protocols - TCP/IP and OSI Models

Today I'm going to cover Protocols and Standards within Computer Networking, more specifically, the TCP/IP and OSI conceptual models for communication. We're going to look at how they link together to form the framework for device-to-device communication over local and worldwide networks. 

There are a plethora of different types of Standards and Protocols in Computer Networking developed and worked upon by a variety of agencies. All with the striving goal of creating seamless, instantaneous communication. They are required, to govern systems and to ensure structure and reliability in the products available and the functions across multiple communicable platforms. In short, the conceptual model remains relevant whether a device, is running the latest Apple Operating System, Windows or Linux.

Network communications protocols can be split down into seven different layers using the OSI model. The OSI model was developed in 1984 by the International Organisation for standardisation (ISO) and remains continues to be the structure on which Network Protocols are based. 'OSI' is the abbreviation for 'Open Systems Interconnection Model'.

There are seven layers that make up the OSI model, and they can be remembered in a variety of different mnemonic phrases. for example;

  • All People Seem to Need Data Processing
  • Please Do Not Throw Sausage Pizza Away
Each layer actually provides a strict set of protocols and are represented below in corresponding order:
  • Physical (Layer 1)
  • Data Link (Layer 2)
  • Network Layer (Layer 3)
  • Transport Layer (Layer 4)
  • Session Layer (Layer 5)
  • Presentation Layer (Layer 6)
  • Application Layer (Layer 7)

 The Physical Layer transfers data at the binary level. This means all data is translated into ones and zeroes before it is transferred along a network medium. Layer one also governs network media and signals; this includes network cabling and wireless transmissions of devices connected to the network.
At Layer 2 or the Data Link layer, bits are encoded/decoded and appropriate IP addressing information is added before the data frame can be sent across the network. If this wasn't done, the data wouldn't know its destination and would never arrive.
The Network Layer follows on from the Data Link Layer, and works on four basic principles to complete its job. It addresses and encapsulates the data before it is routed across the network, once it arrives at its destination, the packet is then de-encapsulated.
The Transport Layer opens up temporary communication between applications on a network, allowing the transference of data between the two applications.
The Session Layer opens up and controls the communication between several computers. Whilst it is active, it maintains and controls the temporary connections between multiple devices.
The Presentation Layer formulates the information that has been transferred over the network back into a readable/understandable format for the end-user.
The Application Layer is the system that provides the interface for the end-user to use. Application Layer protocols are used to exchange data between programs running on source and destination systems.

There is an equivalent set of standards to the OSI model and that comes in the form of the TCP/IP model.
TCP stands for Transmission Control Protocol, and it is a standard that defines how to create and maintain network communications. This includes everything from establishing communication with other devices, either on the same network or across vast distances. It also ensures all data is transmitted as quickly and efficiently as possible, with minimal to no errors.
The IP part of TCP/IP naturally stands for Internet Protocol. Internet Protocol can be viewed similar to that of a postal code, wherein without it, you wouldn't be able to send letters or packages. To put that in computing terms, you wouldn't be able to send and receive files or videos.
The TCP/IP model is broken down into four layers as opposed to the OSI model's seven layers.
Again, just like the OSI model, there is a mnemonic which can help you to remember the order of the Layers, and it is as follows. The best way to remember the TCP/IP model is with this sentence: 'TCP/IP comes in A TIN'
  • Application
  • Transport
  • Internet Layer
  • Network Access
The Application Layer represents and controls the functions of the Application, Presentation and Session Layers.
The Transport Layer represents its counterpart in the OSI model.
The Internet Layer represents the Network Layer, and the Network Access layer controls the combined functions of the Data Link and Physical Layers.

Thank you for reading the latest rambling of my blog. As always, if there is anything that you would like me to cover, either new topic or something in more depth, please let me know. Also, if I've made any mistakes in the writing of this topic, please inform me so I can make the necessary amendments.

Until Next Time!




Sunday, 3 March 2019

Wifi 6 and 5G - The future is now!


Hello everybody!

Today I’m going to discuss a major topic today. That is 5G and Wifi 6 technologies, their capabilities, and ponder where those technologies will possibly lead us in the future.
If you like this blog, please follow for regular updates. Also, as always, if there is anything you would like me to cover in this blog. Please contact me and I shall endeavour to cover it.
If you like what is covered here, and you would like to read further into this, please click on the links at the bottom of this blog for further information.

5G and wifi 6 will build upon already successful technologies, and when combined together will provide a successful underpinning for future Internet of Things (IoT) technologies.
Both technologies work on a principle of low latency and high bandwidth.

as implied by the name, '5G' is the fifth generation of mobile wireless technology. its predecessors introduced the ability to send text messages, search the internet, and send/receive video data.
4G improved on the performance of those previous generations by allowing for faster connectivity with the demanding applications at its disposal.

So what is low latency?

Latency refers to delays of data transferring over a network.
Low latency networks are able to transfer massive amounts of data from one computer system to another.
Examples of where low latency is necessary, include; video calls, online gaming and stock market trading.
Long delays in data transmission, for example; in stock market trading, could be the difference between making a lot of money and losing a lot of money. The information is constantly changing, so stockbrokers need the most recent data available.
Whereas online gaming and video calls don't have such lethal consequences when experiencing high latency, it could still incur stuttering unintelligable video playback, especially when attempting to stream high quality content.

What is high bandwidth?

Bandwidth refers to the amount of data that can be transmitted over a network at any one time.
When this is combined with low latency, the transmission of data can appear seamless. low latency is kind of like a refresh rate which is measured in milliseconds. This makes transfers practically unnoticeable.

The applications for 5G and wifi 6 are, in short, mind-blowing. Compared to what we have seen in recent generations, this is a whole new level.
for everyday end-users using these technologies, they can do a number of different things; from downloading full HD movies in a matter of seconds, instead of a matter of minutes (as is the current standard).
Even that will seem infintesimally small in comparison when compared to other real world applications.
The technologies will allow for greater connectivity, not just in the big cities, but in rural areas as well.
Cisco are running a project they call '5G rural first' which aims at providing excellent internet connectivity for the areas that recently didn't have this opportunity. This will in turn provide further benefits and opportunities to a wider array of people.
This technology coupled with smart sensors could help farmers predetermine when to plant crops or when to harvest. It could even help save entire loads of crops by determining when intervention is necessary.
In the big cities, it could mean truly ubiquitous computing environments. smart cars, that are autonomous, always connected and receiving updates on traffic, road-works. The cars data could even link to a smart phone if a fault becomes present and requires attention. Okay so maybe I'm getting too carried away now, but who is to say, that wouldn't be the next logical step in autonomous transport?

However, there are downsides too, naturally. 5G works in a higher band wireless frequency to 4G. This will require more attenas to be built, for the signal to travel further. whilst this may not be an issue in big cities. It will certainly become costly in more rural areas.


Wifi 6 will also improve upon its predecessors, in terms of speed but will also improve on its capacity to carry data, and do it more efficiently. The Wifi Alliance has stated that Wifi 6 is designed to work alongside current standards and not replace them entirely.

These technologies are currently in the experimental stages, and whilst they are going to be implemented later this year and in 2020. It is not for a few years yet, that we will greatly be able to see the impact that they are having, and the applications they are going to be applied too which will change our lives in ways we probably cannot even concieve of yet. As of 2020 it is estimated that there are going to be a staggering 30.73 billion connected devices. all receiving updates and providing data to its users. The call for something that can handle this unbelievable number of connected devices is on the verge of being answered.
The question itself though begs, with IoT devices currently numbered in the billions, where do we go from here?




Bibliography

https://www.informatica.com/gb/services-and-training/glossary-of-terms/low-latency-definition.html#fbid=UlQb9osRwpP

"low latency." Definitions.net. STANDS4 LLC, 2019. Web. 3 Mar. 2019. <https://www.definitions.net/definition/low+latency>.


https://www.5gruralfirst.org/