CYBERSECURITY AND NETWORKING
Information Technology Tools and Techniques for Organizations
Computer Components
Logic Gates
In this module I learned:
How a processor, monitor, keyboard, printer, mouse, hard drive, and USB drive work together within a computer system. I learned how data flows among these devices. With a processor at the center of the computer system data flows in from input devices such as a keyboard or a mouse. Data flows out from the processor to output devices such as a printer or monitor. There also devices that data flows to and from the processor. Examples of these devices are a hard drive or USB drive.
About logic gates and how a binary number system is used to control the operation of these gates. The number zero is used when a logic gate is closed and the number one is used when a logic gate is open. Logic gates have inputs and outputs and there are three basic operations.
AND gates require at least two inputs be On in order to output an On signal.
OR gates require at least one input to be On in order to output an On signal.
NOT gates basically reverse whatever input is put into it.
How to access an E2C instance on Amazon Web Service and explore the Linux file system. The Linux operating system is a free open-source operating system first released in 1991 by Linus Torvalds. Linux is a Unix-like operating system that is the industry standard for running web servers. Linux has better stability and reliability than other operating systems.
Web Programming Module
In the web programming module, I created my first webpage using HTML. This page was created by using the notepad program on my computer and included the use of some basic HTML commands. These commands allowed me to use different font sizes, change the background color, add an image, and include links to other webpages.
I then created my second webpage. This page is about the history of HTML and adds some additional HTML element and also Cascading Style Sheets (CSS). This layering program allowed me to do things such as change colors of the background/fonts, center items on my page, add a list, and add a button to the webpage. Another thing I did on this webpage was use different size fonts as part of the HTML code.
Now I have created my third webpage and this page was created with the addition of JavaScript. Using the <script> command in JavaScript I have been able to make changes to HTML content based on a user's input. When my page loads a greeting gives a user the opportunity to interact with my page. Once a user submits their name a custom greeting replies. I added vote buttons to my page under each location/phot and a tally is kept for each click of the button. I also added a text line that changes colors when location titles are clicked by a user.
Each of these assignments are building my skills in computing. My confidence grows with each assignment as does my ability to troubleshoot and fix problems along the way.
Showcase your best projects or assignments here.
My First Webpage made using HyperText Markup Language:
https://hibbarkm-web.s3.amazonaws.com/index.html
My Second webpage. This assignment adds Cascading Style Sheets:
https://hibbarkm-web.s3.amazonaws.com/History+of+HTML+webpage.html
My third webpage. This assignment adds Javascript:
https://hibbarkm-web.s3.amazonaws.com/Javascript+assignment.html
Networking Module
I began this module by creating a topology of network components in a program named Viso. This assignment allowed me to learn how devices work are connected and how data flows within the network. Before beginning the networking module, I was familiar with the end user devices such as a personal computer and the Wi-Fi router I have in my home that provides internet but, I was not aware of how internet service travels from a web server and provides service through an entire network with my pc being a just a “node” that is linked to the network. I also learned the advantages of using a wide area network’s (WAN) reach over a local area network (LAN).
Following the introduction to devices that operate in a network our next assignments taught me the basics of addresses and how the addresses are allocated. The use of multiple routers in our topology illustrated that as service enters the network it is broadcast out into additional routers. Routers work as the name implies, as a device to route service. Each connected router must have an IP address and must be a different network. This section taught me that a network is comprised of a network number (combination of IP address and subnet mask) and all the nodes on in a network will share the same network number and subnet mask.
After learning about network numbers, we were introduced to subnet masks and then Network configuration and troubleshooting. This process allows for the splitting of networks into multiple smaller networks. Creating a network within a network makes the network more efficient by allowing network traffic a shorter distance to travel without passing through unnecessary routers. An overview of how to set a static IP address on a computer was provided in our lecture to prepare us to use this procedure in a future assignment on a virtual machine. And finally, we learned how to use a command prompt on our machine to check our connection and then ping to determine end-to-end connectivity. This a troubleshooting operation will need to determine if a device can be reached or not on the network.
Database Module
The database module began with a small group assignment with several classmates. This assignment required doing some research to learn how data storage and retrieval concepts and tools have changed over time. One of my contributions to the assignment, a 5 1/4” floppy disk with a common capacity of 360 KB of data, seems miniscule in comparison to the data storage tools of today. A question asked in this module was if there is more data today than there was 100 years ago? My immediate response was yes. But as was described in the presentation it isn’t that we have that much more data but rather we have more access than we did 100 years ago. There has been and continues to be better tools that have improved our ability to store, organize, and retrieve data have greatly improved. A Relational Database is an example of a tool that has improved our ability to access data that is related to one another.
The MOST IMPORTANT Data Management Concept is:
· Having what you want, when you want it
· Having what you didn’t know you wanted when you want it
· Accuracy and timing
The usefulness of a Database was illustrated by the example of how entities such as students, professors, and courses, are related within a university. By adding attributes to the entities, we were able to learn how a database can transform the entered data, via a query, into useful knowledge such as which students are taking a specific course from a professor. A different query of that same entered data would tell us how many students each professor is teaching. And another different query of that same entered data would tell us how many students are taking each course offered.
My favorite part of this module was learning how to create a simple database and then query the data I entered to develop knowledge. This hands-on learning is how I best understand and retain information. During a couple steps of the assignments, I found myself not getting the results I wanted. This gave me the opportunity to problem solve and work things out until I was able to get the desired results. I enjoy situations that require me to work things out because it activates an attention to detail mindset and I feel a sense of accomplishment when I am able to solve the problem.
This is an example of a simple query from several different tables in a database. Each table (Teacher, Student, Course, Enroll) contained different data and by use of a simple query I was able to create a list of students that were enrolled in CIT 168 being taught by Rita Hayes. The list also includes the grades the students received in the course.
Global Cybersecurity
Modules 1-4
In section 2.4 we learned about vulnerability concerns. Something specific I learned was the importance of being very careful when working in a root directory. There may be times that I need to work with administrator privileges as a superuser so any work performed in the root directory must be checked and double checked before implementation. Without a safety net a mistake working in this environment could be catastrophic. Working as a super user requires meticulous attention to detail. That isn’t to say that working as a regular user doesn’t require precision, but the costs of mistakes aren’t as high while working with limited privileges.
Understanding that every person subscribes to different ethical theories I will ensure I am safeguarding the equipment I work with. In section 3 we learned about physical security measures to keep our equipment and networks safe from actors that may act unethically. An actor may feel the ends justify the means because their belief system is utilitarian. Don’t share that viewpoint. I feel I am more of a divine theory ethical perspective person. If an actor’s focus is on achieving their desired outcome at any cost, then access to equipment must be protected from those actions. Restricting access to equipment, preventing unwanted disclosure of information, and preventing loss of assets from situations like fire or theft are ways I will act ethically in protecting the equipment entrusted to me. This means I need to stay current on threat trends and security measures to combat those threats. I will also ensure I am familiar with and abiding by the principles of the ACM Code of Ethics and Professional Conduct. The ACM code is the standard for computing professionals that outlines ethical actions we can follow to ensure we are acting ethically.
The job of a cybersecurity professional is as much a reactionary role to active threats as it is a proactive role in preparing and protecting systems for potential attacks. Technology continues to evolve so a cybersecurity professional needs to be able to evolve as well. I feel cyber attacks and the responses cybersecurity specialist employ are like healthcare’s response to viruses. When a new attack is introduced to a system that is like a virus seeking a host. The response to the attack would be like a physician administering medicine to reduce or stop symptoms. While this happens cybersecurity specialist would look for ways to strengthen their systems from future attacks just as medical professionals test new drugs to develop vaccines. The reaction to the attack is where cybersecurity specialists must take an active role.
An example that I present to solve security challenges facing humanity is user control implementation. As we learned in section 2, insider actors pose a very real threat and are often overlooked as threat agents. Educating users on proper protocols is the first way to promote safe computing use. Ensuring appropriate level privileges for fellow employees is another action I will take to limit my company’s exposure to data breach. Additionally, I will monitor and audit implemented security protocols to ensure compliance. The exchange of data from outdated systems or under protected systems is a worldwide security challenge that cybersecurity specialists should be working to contain. As artificial intelligence technology is implemented in more situations the risks of data mining grow exponentially. Owners of data have the right to decide if their data is shared with others. Not every piece of leaked data will be used maliciously but there is the possibility it could be so I will make efforts to protect the systems I work on from data breaches and intrusion.
Modules 5-7
Something I learned that will be useful in my career is material covered in module 6. I expect to be tasked with monitoring and modifying user controls in my duties as an IT professional. One example that sticks out to me is understanding privilege creep. I can envision someone leaving a position and the need to be mindful of changing privileges. I think many of us assume that once a person has achieved a certain level of privileges why should that change with a new job.
Module 7 covered cryptography and the importance of encryption when it comes to data. Emphasizing privacy is an ethical use of skills I learned in this chapter. Combining different methods of encrypting data will allow me to ensure I’m doing all I can to reduce the chances of a data breach.
Solving challenges related to cybercrime is why I choose to study this field. An example of a way to respond to those challenges is covered in module 8, wireless defenses. Wireless hacks have been and continue to be a great concern in the world of cybersecurity. By understanding system configurations and ensuring I am not implementing weak systems I can make the systems I work on less of a “soft target”. Hackers seek ways to intrude and target defense is a big key to whether there is an actual breech or just a sniff to try to access an easy target.
Modules 8-11
Modules 8-9 of this course introduced us to security assessments, incident response, forensics, and recovery. Module 10 covered risk management, governance, and compliance. In Module 11 we completed a research assignment on country other than the United States to learn about cybersecurity laws from a worldwide perspective. My chose region was the United Kingdom (UK) and I learned how cybersecurity and information technology laws in the countries of Scotland, Northern Ireland, Wales, and England are applied. The UK excels in notification of data breaches and is taking steps to improve an already robust cyber community. Investing in cyber is a proactive measure that will continue to benefit the UK in the future as more and more technology emerges.
Skills I learned in modules 8-11 that I will be able to use to promote a safer use of technology include penetration testing, intrusion detection, and analyzing network attacks. Understanding the need to test organization defenses I will use the knowledge I gained to help improve the systems work on. Some skills I learned from these modules to promote ethical use of technology include understanding how to mitigate an incident, manage logging, and create backups of data that can be recovered as response to attacks. Time and effective defense strategies are what determine whether a minor breach becomes a major breach. I will use the information I learned to ensure I am responding appropriately to minimize damage and also ensure I am able to retrieve the original data that may have been altered on the servers I work on. The importance of organizational security policies was stressed, and we learned how to complete audits as part of our monitoring of workstations.
Coupling the skills I ‘ve learned from the exercises in TestOut, along with the knowledge I gained from my research projects I will be able to use the information I’ve learned as I continue my career in cybersecurity. I plan to work in the Veteran Affairs or Veteran Healthcare system and there will be circumstances that I may need to mitigate an attack on government servers. Understanding the US laws and the organizational regulations of the government will help me formulate the appropriate responses to counter attacks on government servers and prevent data breaches.
Database Design and Development
From someone with very little background in computer science this course was difficult but not overwhelming. The topics were taught in a building block style to ensure we grasped basic concepts and then used those to complete assignments. At the onset of the class I was unsure if I would be able to understand database building to allow for completion of the final project, but I was able to complete a project deliverable with a working database that I designed. I feel more confident now after this course to build on the material in my future courses.
HIT Around the World
I believe the knowledge I gained from the research completed in this course on Veterans Health Administration is priceless and will pave a path for me into a new career helping fellow veterans. I choose two of the CIT 231 learning objectives listed on my home page to write as a final reflection of this course.
I choose to address the learning objective of “Global culture and equity issues in the delivery of healthcare and related technologies” because I feel this topic caused the deepest emotional response personally. In one of early assignments, we studied the subject of modern medicine and traditional healing. In all honesty this isn’t a subject that I gave much consideration to before our assignments. It isn’t because I didn’t care about the cultures of others but rather because I’ve seen things from my own eyes for over 50 years. These assignments allowed me to focus on issues that as a white middle-aged man, I simply haven’t experienced. In the video “Connecting Modern Medicine to Traditional Healing” by Dr. Torres I was able to find common ground regarding allopathic medicine. Because of the stories Dr. Torres delivered I was able to consider my own family of origin and the traditional medicine passed down from my Appalachian ancestors. This experience led me to research how my chosen organization, Veterans Health Administration (VHA) views alternative healing and I was happy to learn its supported as part of a whole health approach for treating veterans. It takes a mindful choice to consider the culture of others and it’s something anyone in a service-related industry, including healthcare professionals, should choose to remember.
Another learning objective we covered was familiarization and “use of an Electronic Health Record to schedule, document, and summarize a healthcare encounter”. Secure digital media is an improvement over other record keeping practices. By working on different tasks in our EHRGO assignments I was able to learn what information is stored in an electronic healthcare record. In reviewing entries listed by stakeholders I recognized the value of having this information immediately available to care givers. This was further solidified in our case study assignment where I learned how electronic records are being used to ensure the vaccinations of infants and to track the health of pregnant mothers. From my own personal experience of papar records vs digital records as a veteran I understand the value of having electronic records to ensure continuous transition of care. As VHA undergoes the modernization of their electronic health record system, and I may be involved in that process, I plan to use the knowledge gained in this learning objective to accomplish the organization’s goals.
A dice rolling game I created...
I think it was valuable to review the programs other students created because it opened my eyes to things I didn’t consider. An example of this is the roll loop created that doesn’t require input from a user to keep rolling dice until a win/loss occurs. Something very cool was the GUI version of the game Koty created. Another benefit of reviewing files is seeing that some of my classmates missed things in their program as I did. One of our classmates pointed out the need to ensure negative numbers our letters aren’t accepted as the BetAmount. I noticed that problem with my code while reviewing feedback that was left for another classmate and realized I had the same problem with my code.
A calculator program I created...
Learning how to use a GUI interface was the best part of these modules. Although the back end of programs may not be my favorite part of programming it is a feeling of accomplishment being able to create a simple user interface from the program code.
I worked alone on the mini project because at times I needed to slow down to figure things out. I was concerned that by working with others I would feel more anxiety to try and keep up or learn and apply things in the same time frame as others. In reviewing the programs of others, I was impressed that one of our classmates made a GUI of the project. I also learned where I was missing things in my code so by reviewing the code others created, I was able to revise my program to address those issues.
Class homepage I created Final project I created
My knowledge of web programming, database integration, and security procedures has grown as a result of the demanding yet worthwhile experience that was CIT 273. I improved my ability to create reliable online apps, efficiently manage databases, and apply secure coding standards during the training.
Key takeaways:
1. Project-Based Learning: I completed multiple hands-on projects, including a class homepage and my final project, an online motorbike store. These projects honed problem-solving abilities and practical application of coding ideas.
2. Understanding SQL and database connectivity helped me discover best practices for data retrieval and security during my coursework.
3. Security Principles: The course focused on secure authentication and preventing vulnerabilities such as SQL injection.
4. Professional Portfolio Development: The portfolio update helped me organize and enhance my work for future reference, including job applications and personal growth.
Future Uses: The skills I learned in CIT 273 have made me feel like I can use my understanding of web development and security in professional or freelance work. In the future, I want to learn more about advanced programming topics that will help me get a job in IT and further my schooling.