The modern world evolves more rapidly than any age previous, we live in an age where everything is digital, and i mean everything. There are TVs, Thermostats and Lights for your home, are just some examples of devices that can be controlled via an app on your mobile phone. Therefore, Cyber Security awareness is essential in protecting yourself online.
The most common cyber attacks take place through individuals who are not very security conscious, or just don't feel that cyber crime will affect them as they don't have anything worth taking. However, this couldn't be further from the truth. There is nothing on Earth more valuable than an individuals identity.
Some of the most commonly used passwords from 2018 are as follows:
123456
Password
Password1
qwerty
Along with this short list of passwords, another common password type is close family relations or pets. The reason they aren't good passwords is because, anybody browsing a social media account could easily find out about the life of the person they were 'stalking' online. People often put pictures of their family with a label underneath depicting what is taking place in the photograph. In extension of that, if the people in the photo also have social media, it is possible to tag them, enabling information to be found out more easily.
When creating passwords for online accounts, they should consist of a mixture of uppercase and lowercase lettering, with punctuation as well. for example; 'Pass@word1.' or better still '.1drOw@ssap'.
*note* these are examples and 'password' in any form should never be used as a password for any system, ever.
The password, naturally, will need to be something that you can remember, as passwords should never, ever be written down. There have been known incidents of people writing down their new password and taping it to their monitor, meaning that anybody could just walk past their desk, type in the login credentials and gain unauthorised access with minimal effort. The threat is doubled if that person happens to have administrator privileges and can make substantial changes to the data on the device.
Nobody is impervious to making mistakes regarding cyber security, there were several incidents in the news a few years ago, where government officials had been carrying laptops on a train journey. The machine in question had unencrypted sensitive data and was accidentally left on the train.
Sensitive information could be anything from login details to a social media account all the way up to details regarding online banking accounts.
It only takes a few details to steal your identity, and the more they know, the easier it is to impersonate you.
A common attack used by hackers is a skill known as 'social engineering'. An example of where this attack would be used; Would be a hacker phoning up a company pretending to be an employee that had misplaced or forgotten their details. If the hacker is able to provide details about the system or has access to account details but not the password, the person on the phone could potentially be tricked into creating an account for them as an employee of the organisation. Whereby the hacker would have successfully gained access to a confidential system without raising any red flags. This would then provide them access to confidential company information which they then maybe able to edit or delete, or possibly copy that information and sell it on elsewhere, giving other companies a leading edge with classified insider knowledge.
Another common attack on organisations come from within the organisation itself. Employees have access to information on secure servers with their login credentials, and it wouldn't flag any systems when they access the data, as they are proper clearance to view that information.
Another type of attack is known as a DOS or Denial-of-Service attack. This is where the attacker seeks to make company resources unavailable by disrupting the services of machines connected to the internet.
A DOS attack can come in several forms, one of which includes; overloading memory buffers preventing the system from carrying out its normal function, effectively shutting it down until the attack ceases.
Another attack includes flooding the target with data packets, again rendering their system unusable until the attack subsides. this type of attack is only possible if the target has lower bandwidth than the perpetrator carrying out the attack.
I hope you have enjoyed this brief overview of Cyber Security. As a reminder, it is also important to change your passwords on a regular basis to keep all of your data secure, and NEVER tell your password to another person, no matter how much you trust them.
If you enjoyed this blog and would like to see any of the topics within it, covered in more detail or would like to know about something else related to cyber security, then please message me and I shall endeavour to cover it in my future blog posts.
Sunday, 17 March 2019
Cyber Security
Labels:
2018,
CCENT,
CCNA,
Cisco,
Communication,
Computer Networking,
Cyber Security,
Passwords,
Secure
Wednesday, 6 March 2019
Networking Protocols - TCP/IP and OSI Models
Today I'm going to cover Protocols and Standards within Computer Networking, more specifically, the TCP/IP and OSI conceptual models for communication. We're going to look at how they link together to form the framework for device-to-device communication over local and worldwide networks.
There are a plethora of different types of Standards and Protocols in Computer Networking developed and worked upon by a variety of agencies. All with the striving goal of creating seamless, instantaneous communication. They are required, to govern systems and to ensure structure and reliability in the products available and the functions across multiple communicable platforms. In short, the conceptual model remains relevant whether a device, is running the latest Apple Operating System, Windows or Linux.
Network communications protocols can be split down into seven different layers using the OSI model. The OSI model was developed in 1984 by the International Organisation for standardisation (ISO) and remains continues to be the structure on which Network Protocols are based. 'OSI' is the abbreviation for 'Open Systems Interconnection Model'.
There are seven layers that make up the OSI model, and they can be remembered in a variety of different mnemonic phrases. for example;
The Physical Layer transfers data at the binary level. This means all data is translated into ones and zeroes before it is transferred along a network medium. Layer one also governs network media and signals; this includes network cabling and wireless transmissions of devices connected to the network.
At Layer 2 or the Data Link layer, bits are encoded/decoded and appropriate IP addressing information is added before the data frame can be sent across the network. If this wasn't done, the data wouldn't know its destination and would never arrive.
The Network Layer follows on from the Data Link Layer, and works on four basic principles to complete its job. It addresses and encapsulates the data before it is routed across the network, once it arrives at its destination, the packet is then de-encapsulated.
The Transport Layer opens up temporary communication between applications on a network, allowing the transference of data between the two applications.
The Session Layer opens up and controls the communication between several computers. Whilst it is active, it maintains and controls the temporary connections between multiple devices.
The Presentation Layer formulates the information that has been transferred over the network back into a readable/understandable format for the end-user.
The Application Layer is the system that provides the interface for the end-user to use. Application Layer protocols are used to exchange data between programs running on source and destination systems.
There is an equivalent set of standards to the OSI model and that comes in the form of the TCP/IP model.
TCP stands for Transmission Control Protocol, and it is a standard that defines how to create and maintain network communications. This includes everything from establishing communication with other devices, either on the same network or across vast distances. It also ensures all data is transmitted as quickly and efficiently as possible, with minimal to no errors.
The IP part of TCP/IP naturally stands for Internet Protocol. Internet Protocol can be viewed similar to that of a postal code, wherein without it, you wouldn't be able to send letters or packages. To put that in computing terms, you wouldn't be able to send and receive files or videos.
The TCP/IP model is broken down into four layers as opposed to the OSI model's seven layers.
Again, just like the OSI model, there is a mnemonic which can help you to remember the order of the Layers, and it is as follows. The best way to remember the TCP/IP model is with this sentence: 'TCP/IP comes in A TIN'
The Transport Layer represents its counterpart in the OSI model.
The Internet Layer represents the Network Layer, and the Network Access layer controls the combined functions of the Data Link and Physical Layers.
Thank you for reading the latest rambling of my blog. As always, if there is anything that you would like me to cover, either new topic or something in more depth, please let me know. Also, if I've made any mistakes in the writing of this topic, please inform me so I can make the necessary amendments.
Until Next Time!
There are a plethora of different types of Standards and Protocols in Computer Networking developed and worked upon by a variety of agencies. All with the striving goal of creating seamless, instantaneous communication. They are required, to govern systems and to ensure structure and reliability in the products available and the functions across multiple communicable platforms. In short, the conceptual model remains relevant whether a device, is running the latest Apple Operating System, Windows or Linux.
Network communications protocols can be split down into seven different layers using the OSI model. The OSI model was developed in 1984 by the International Organisation for standardisation (ISO) and remains continues to be the structure on which Network Protocols are based. 'OSI' is the abbreviation for 'Open Systems Interconnection Model'.
There are seven layers that make up the OSI model, and they can be remembered in a variety of different mnemonic phrases. for example;
- All People Seem to Need Data Processing
- Please Do Not Throw Sausage Pizza Away
- Physical (Layer 1)
- Data Link (Layer 2)
- Network Layer (Layer 3)
- Transport Layer (Layer 4)
- Session Layer (Layer 5)
- Presentation Layer (Layer 6)
- Application Layer (Layer 7)
The Physical Layer transfers data at the binary level. This means all data is translated into ones and zeroes before it is transferred along a network medium. Layer one also governs network media and signals; this includes network cabling and wireless transmissions of devices connected to the network.
At Layer 2 or the Data Link layer, bits are encoded/decoded and appropriate IP addressing information is added before the data frame can be sent across the network. If this wasn't done, the data wouldn't know its destination and would never arrive.
The Network Layer follows on from the Data Link Layer, and works on four basic principles to complete its job. It addresses and encapsulates the data before it is routed across the network, once it arrives at its destination, the packet is then de-encapsulated.
The Transport Layer opens up temporary communication between applications on a network, allowing the transference of data between the two applications.
The Session Layer opens up and controls the communication between several computers. Whilst it is active, it maintains and controls the temporary connections between multiple devices.
The Presentation Layer formulates the information that has been transferred over the network back into a readable/understandable format for the end-user.
The Application Layer is the system that provides the interface for the end-user to use. Application Layer protocols are used to exchange data between programs running on source and destination systems.
There is an equivalent set of standards to the OSI model and that comes in the form of the TCP/IP model.
TCP stands for Transmission Control Protocol, and it is a standard that defines how to create and maintain network communications. This includes everything from establishing communication with other devices, either on the same network or across vast distances. It also ensures all data is transmitted as quickly and efficiently as possible, with minimal to no errors.
The IP part of TCP/IP naturally stands for Internet Protocol. Internet Protocol can be viewed similar to that of a postal code, wherein without it, you wouldn't be able to send letters or packages. To put that in computing terms, you wouldn't be able to send and receive files or videos.
The TCP/IP model is broken down into four layers as opposed to the OSI model's seven layers.
Again, just like the OSI model, there is a mnemonic which can help you to remember the order of the Layers, and it is as follows. The best way to remember the TCP/IP model is with this sentence: 'TCP/IP comes in A TIN'
- Application
- Transport
- Internet Layer
- Network Access
The Transport Layer represents its counterpart in the OSI model.
The Internet Layer represents the Network Layer, and the Network Access layer controls the combined functions of the Data Link and Physical Layers.
Thank you for reading the latest rambling of my blog. As always, if there is anything that you would like me to cover, either new topic or something in more depth, please let me know. Also, if I've made any mistakes in the writing of this topic, please inform me so I can make the necessary amendments.
Until Next Time!
Labels:
Apple,
Blog,
CCENT,
CCNA,
Cisco,
Communication,
Computer Networking,
Conceptual,
Linux,
OS,
OSI,
TCP/IP,
Technology,
Windows
Sunday, 3 March 2019
Wifi 6 and 5G - The future is now!
Hello everybody!
Today I’m going to
discuss a major topic today. That is 5G and Wifi 6 technologies,
their capabilities, and ponder where those technologies will possibly
lead us in the future.
If you like this
blog, please follow for regular updates. Also, as always, if there is
anything you would like me to cover in this blog. Please contact me
and I shall endeavour to cover it.
If you like what is
covered here, and you would like to read further into this, please
click on the links at the bottom of this blog for further
information.
5G and wifi 6 will
build upon already successful technologies, and when combined
together will provide a successful underpinning for future Internet
of Things (IoT) technologies.
Both technologies
work on a principle of low latency and high bandwidth.
as implied by the
name, '5G' is the fifth generation of mobile wireless technology. its
predecessors introduced the ability to send text messages, search the
internet, and send/receive video data.
4G improved on the
performance of those previous generations by allowing for faster
connectivity with the demanding applications at its disposal.
So what is low
latency?
Latency refers to
delays of data transferring over a network.
Low latency networks
are able to transfer massive amounts of data from one computer system
to another.
Examples of where
low latency is necessary, include; video calls, online gaming and
stock market trading.
Long delays in data
transmission, for example; in stock market trading, could be the
difference between making a lot of money and losing a lot of money.
The information is constantly changing, so stockbrokers need the most
recent data available.
Whereas online
gaming and video calls don't have such lethal consequences when
experiencing high latency, it could still incur stuttering
unintelligable video playback, especially when attempting to stream
high quality content.
What is high
bandwidth?
Bandwidth refers to
the amount of data that can be transmitted over a network at any one
time.
When this is
combined with low latency, the transmission of data can appear
seamless. low latency is kind of like a refresh rate which is
measured in milliseconds. This makes transfers practically
unnoticeable.
The applications for
5G and wifi 6 are, in short, mind-blowing. Compared to what we have
seen in recent generations, this is a whole new level.
for everyday
end-users using these technologies, they can do a number of different
things; from downloading full HD movies in a matter of seconds,
instead of a matter of minutes (as is the current standard).
Even that will seem
infintesimally small in comparison when compared to other real world
applications.
The technologies
will allow for greater connectivity, not just in the big cities, but
in rural areas as well.
Cisco are running a
project they call '5G rural first' which aims at providing excellent
internet connectivity for the areas that recently didn't have this
opportunity. This will in turn provide further benefits and
opportunities to a wider array of people.
This technology
coupled with smart sensors could help farmers predetermine when to
plant crops or when to harvest. It could even help save entire loads
of crops by determining when intervention is necessary.
In the big cities,
it could mean truly ubiquitous computing environments. smart cars,
that are autonomous, always connected and receiving updates on
traffic, road-works. The cars data could even link to a smart phone
if a fault becomes present and requires attention. Okay so maybe I'm
getting too carried away now, but who is to say, that wouldn't be the
next logical step in autonomous transport?
However, there are
downsides too, naturally. 5G works in a higher band wireless
frequency to 4G. This will require more attenas to be built, for the
signal to travel further. whilst this may not be an issue in big
cities. It will certainly become costly in more rural areas.
Wifi 6 will also
improve upon its predecessors, in terms of speed but will also
improve on its capacity to carry data, and do it more efficiently.
The Wifi Alliance has stated that Wifi 6 is designed to work
alongside current standards and not replace them entirely.
These technologies
are currently in the experimental stages, and whilst they are going
to be implemented later this year and in 2020. It is not for a few
years yet, that we will greatly be able to see the impact that they
are having, and the applications they are going to be applied too
which will change our lives in ways we probably cannot even concieve
of yet. As of 2020 it is estimated that there are going to be a
staggering 30.73 billion connected devices. all receiving updates and
providing data to its users. The call for something that can handle
this unbelievable number of connected devices is on the verge of
being answered.
The question itself
though begs, with IoT devices currently numbered in the billions,
where do we go from here?
Bibliography
https://www.informatica.com/gb/services-and-training/glossary-of-terms/low-latency-definition.html#fbid=UlQb9osRwpP
"low latency."
Definitions.net. STANDS4 LLC, 2019. Web. 3 Mar. 2019.
<https://www.definitions.net/definition/low+latency>.
https://www.5gruralfirst.org/
Labels:
5G,
Autonomous,
Bandwidth,
Cisco,
Computer Networking,
Computing,
Connectivity,
IoT,
Latency,
Rural First,
Smart Sensors,
Technology,
Wifi 6
Subscribe to:
Posts (Atom)