Tuesday, October 5, 2021

Network Security

 

Network Security

     Network security has become essential to most companies trying to secure sensitive data. Data breaches are commonplace, and it is increasing each year. According to Labounty (2017), “network security is the process of taking preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction or improper disclosure.” Devices on a network, such as routers and firewalls, must have security embedded to protect against threats. In addition, network security is necessary to protect data on computers and servers on a network.

            Modern technology is vast, and protections must be in place to secure technological devices from external and internal threats. With the invention of Wi-Fi in the mid-90s, network security has become even more critical. Wireless technology is now one of the main components of most network-enabled devices and systems. Wireless technology is essential in items we use every day, from government utilities, computers, traffic lights, and home appliances. Specifically, today’s computers all come with wireless capabilities, and private information traveling over a wireless connection must be secured. Computers are needed to manage applications that monitor network security.

Modern computers are the backbone used to control, maintain and monitor network security. Software that controls network security is commonly installed on computer systems for centralized management. For example, Cisco Wireless Lan Controller software installed on a computer manages the availability and access to Cisco wireless routers on its network. Wireless adapters or USB wireless devices can be attached to desktop computers to provide wireless access. To protect the operating systems on computers, virus and network protection are commonly installed to detect and monitor network threats. Finally, remote management software can provide users the access to manage network security devices from various locations.

Programming languages provide advanced management of network protection. For example, Mikrotek, a small company based in Bali, Indonesia, uses PHP and Linux languages to authenticate users for VPN access on a RADIUS server. The PHP scripts are used to control bandwidth across the VPN connection using security protocols (Sukarsa, 2021). Some VPN programs execute on-demand programs when computers detect that a link is needed to a remote location. One of the most popular programming languages used for security today is Python. According to Ying (2020), the Python language is used to verify application performance and intrusion information across wireless networks. They are additional programming languages such as Java and C++ that are used for security-related functions.

           Network security and its features heavily rely on application software to function properly. Various software programs are used for logging, tracking, and maintaining security-related activities and access. Encryption software such as Bitlocker and Lastpass enable information to be secure when traveling across a network, keeping its information private and safe. Symantec, another program that offers malware detection and prevention, can be centrally managed on a server. Regular updates for Symantec are sent to client computers using scheduled executable services. 

          Information collected from network security activities must be stored or recorded. Important information is saved to searchable databases to keep a record of network and access activities. The records can be reviewed for auditing purposes, attempted threats, or investigations of security breaches. Two of the most popular database management software are Microsoft SQL and Oracle. According to Wang (2020), database programming is necessary to “provide effective support for the innovative development of modern software systems.” For successful advancements in network security information and storage availability, the integration of database and software programming is essential.  

Information technology is essential in most organizations today, and the need to protect their data is vital. After fifteen years in the IT field managing networks and learning the importance of protecting a company’s information, I have seen the damage caused by network threats faced by many organizations, including Yahoo, Facebook, and Netflix. Organizations must consistently keep up to date with the latest protection against network and virus threats. Overall, my interest in cybersecurity stems from the work that I currently do to advance my career into the growing field of cybersecurity.

-----------------------------------------------------------------------------------------------------

References

Labounty, C. (2017, August 2). What is network security and why is it important? Herzing University. https://www.herzing.edu/blog/what-network-security-and-why-it-important

Sukarsa, I. M., Piarsa, I. N., & Premana Putra, I. G. B. (2021). Simple solution for low cost bandwidth management. Telkomnika, 19(4), 1419–1427.

Ying, Y. (2020). "Design of Information Network Security Situation Monitoring System Based on Python Language," International Conference on Robots & Intelligent System (ICRIS), pp. 269-274, doi: 10.1109/ICRIS52159.2020.00074.

Wang, M. (2020) "Analysis of Database Programming Technology in Computer Software Engineering," International Conference on Computer Communication and Network Security (CCNS), pp. 1-4, doi: 10.1109/CCNS50731.2020.00008.

Thursday, September 30, 2021

Traveling Though a Network

   

             According to Brunken (2016, computers follow basic rules called internet protocol (IP) to communicate data over the internet. Each command is used to test accessibility to other devices on the internet. Each computer has a unique IP address to identify itself on the internet. The Ping com an echo-request packet and waits for a reply (Understanding the Ping and Traceroute Commands, 2006). If there is no reply, this can indicate an issue with the destination device. This is one of the first steps to determine if a device is reachable.

Figure 1.

Google ping

        Brunken (2016) states that the traceroute command maps the path of a message as it travels through a network to another computer. The traceroute pings each device, or router, along its path to see which device may not be sending a reply. This can help determine where the problem can be with the connection to the destination IP. One reason that a ping request might time out is that the destination computer is not connected to the internet. Hence, it does not have an IP address. It is also possible that a router along its path had a problem forwarding the packet to the next router. 

Figure 2.

traceroute of Google

        In reviewing the ping and traceroute commands, the round trip time for the destinations in other countries was longer in its response. The ping response for Google.com was more than 13 times faster than the Japanese destination. The traceroute for the Australian destination timed out after 10 hops, which signaled a problem at the IP for the eleventh hop. Geographical locations that are farther away will take a longer time to receive a response from a ping command.


-----------------------------------------------------------------------------------------------------------------

References

Brunken, J. (2016). Guide to Ping and Traceroute Commands. Retrieved from                        University of Arizona Global Campus.

Understanding the ping and traceroute commands. (2006, November 29).                          Cisco. https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-    software-releases-121-mainline/12778-ping-traceroute.html


Securing our Networks

 

  We face threats every day while using our computers, and most companies are constantly under threat of computer viruses and phishing attempts. According to the Cybersecurity and Infrastructure Security Agency (Virus Basics | CISA, n.d.), “a computer virus is a program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies of itself.” With the abundance of networks in our society, an infected system in one network can spread a virus to another connected network. Viruses are capable of rendering computers unusable or unable to perform everyday tasks. In October 2020, six U.S hospitals were hit with the Ryuk ransomware, making inaccessible patient records and billing information (Middaugh, 2021). The crisis exposed the kind of computer-related threat that can affect people’s lives and disrupt patient care.

There are several ways that computer systems are vulnerable to viruses. Malicious programs such as worms that copy themselves across a network, exploit vulnerabilities in programs on other computers. Vulnerabilities also come from users clicking on a file they received via email. It can download and run through a security hole exposed through a network connection (Carnegie Mellon University, n.d.). Symptoms of viruses include freezing screens or beeping sounds from keyboard use. However, some can be as destructive as reformatting a hard drive.

            According to new research (Alkhalil, 2021), phishing attacks, where cybercriminals use emails to lure unsuspecting users to a malicious website to steal their identities, are also a threat to computer systems. The danger is usually in email form, providing a link to an insecure, fabricated website to provide personal or financial information. Victims can be impacted by financial disruption, loss of reputation, or compromise of national security. Adequate training is needed for employees to recognize the differences in company communications or a fraudulent one.

            Companies can take essential steps to protect against viruses and phishing attacks. Prevention and training can have a positive impact on safeguarding networks from phishing attacks and viruses. According to Hubbard et al. (1998), good anti-virus software updated regularly should be utilized to protect against virus attacks. Operating system and virus updates should be installed and kept current on a routine basis. Phishing attacks can be avoided by ensuring employees and users receive essential training to recognize the signs of fraudulent solicitations. Companies and households must take the necessary steps to have a fighting chance against computer viruses and phishing attacks.

------------------------------------------------------------------------------------------------------------------------------

                                                                    References

Alkhalil, Z. (2021). Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science. https://www.frontiersin.org/articles/10.3389/fcomp.2021.563060/full

Carnegie Mellon University. (n.d.). What are viruses, worms and breakins? Retrieved September 26, 2021, from https://www.cmu.edu/iso/aware/be-aware/virus.html

Hubbard, J. C., & Forcht, K. A. (1998). Computer viruses: How companies can protect their systems. Industrial Management & Data Systems, 98(1), 12-16. doi:http://dx.doi.org.proxy-library.ashford.edu/10.1108/02635579810199708

Middaugh, D. J. (2021). Cybersecurity Attacks during a Pandemic: It Is Not Just IT’s Job! MEDSURG Nursing30(1), 65–66.

Virus Basics | CISA. (n.d.). Cybersecurity and Infrastructure Security Agency. Retrieved September 26, 2021, from https://us-cert.cisa.gov/publications/virus-basics

Technology in the Healthcare Industry

 


Technology in the healthcare industry has made vast improvements in the last twenty years. The advancement of technology has increased the seep and quality of patient care in the industry. In hospitals and private healthcare, technology has decreased the waiting times and enrollment for patients. Technological advancements have also increased the ability to store, share and analyze health information. Telemedicine using technology has enabled doctors to accurately diagnose patients’ problems remotely (skinner, 2020).

     With new technology, training is essential for the staff who performs computer tasks. Having well-trained and computer literate employees is vital in the accuracy and practicality of patient care and diagnosis. Training ensures that technical equipment is correctly used to improve the quality of life for patients and reduce errors in patient records. The role of IT professionals will be more critical as the need for trained technicians will increase. More healthcare jobs require skills in the use of medical and computer equipment, and the ability to solve problems and communication skills is essential in the healthcare industry.

            Technological advances will have a significant impact on the healthcare industry in the future. Each year, automated processes improve with new operating systems, and with the advancement of artificial intelligence, most common tasks are done faster. New computer systems will also allow for less paper to write down important patient information, and advanced networks can result in the increased use of telemedicine and virtual reality technology to assist patients remotely (Thimbleby, 2013).

 --------------------------------------------------------------------------------------------------------------------------

References

Skinner, N. (2020, March 29). Technology’s Vital Role in Healthcare and Society. HIMSS.             https://www.himss.org/resources/technologys-vital-role-healthcare-and-society

Thimbleby H. (2013). Technology and the future of healthcare. Journal of public health research2(3), e28. https://doi.org/10.4081/jphr.2013.e28


Documenting a Day - The Role of Applications

 

Each of the applications for word processing, spreadsheets, presentation, and databases has shared functions. Most of them must be based on simple necessities. For example, the Copy, Paste, Cut, and Insert commands are in most applications. Other controls are based on the purpose of the application. For example, Microsoft PowerPoint has functions specifically for creating animations and multimedia for presentations. Most of the applications have features that enhance the work of the user.

           Each application has some advantages and disadvantages. PowerPoint users benefit from the entertaining slides it creates, but the slides can distract from the goal of the presentation. According to Winn (2003), “slides should facilitate discussion. They highlight your primary teaching points. They should not be the teaching point.” Close attention must be paid on the objective for which the presentation is created. Word is advantageous for its use of letters and flyers, and it is one of the main applications used globally. However, Word has limited functions for images, and it has a high learning curve on some of its features. Advantages of Excel for spreadsheets include the ability to organize data, but learning the formulas for cell input can be time-consuming (Natter, 2019). For Microsoft Access, importing data is simple, and it is easy to install and use. However, it has security concerns and a finite storage system for databases.

           The most appropriate software for my writing was Microsoft Word. I am familiar with the application and its features. It also has a widely used format, which is acceptable at most institutions. The office applications also have the benefit of additional features. One of the additional functions of Word is the ability to create mailing labels for marketing purposes. The print feature can be adjusted to print multiple mailing labels or print on mailing envelopes. An additional part of Excel is using formulas or links from one spreadsheet to a separate spreadsheet. PowerPoint is also useful for education and course material. The slides help demonstrate in-class lectures and “projecting visuals that would be difficult to bring to class (Teaching with PowerPoint - NIU Center for Innovative Teaching and Learning, n.d.).” For Access databases, one of the additional functions is publishing searchable information on the internet. This makes it accessible for remote users. 

----------------------------------------------------------------------------------------------------

References

Natter, E. (2019, January 25). The Advantages & Disadvantages of Spreadsheets. Small Business - Chron.Com. https://smallbusiness.chron.com/advantages-disadvantages-spreadsheets-26551.html

Teaching with PowerPoint - NIU - Center for Innovative Teaching and Learning. (n.d.). Northern Illinois University. Retrieved September 12, 2021, from https://www.niu.edu/citl/resources/guides/instructional-guide/teaching-with-powerpoint.shtml

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

Winn, J. (2003). Avoiding Death by PowerPoint. Journal of Professional Issues in Engineering Education & Practice129(3), 115. https://doi-org.proxy-library.ashford.edu/10.1061/(ASCE)1052-3928(2003)129:3(115)

My Favorite Web Application

Thinkorswim by TD Ameritrade

           I chose to write about the web application, Thinkorswim, available by TD Ameritrade. Thinkorswim is an electronic online trading platform used to monitor, analyze, scan, and trade stock equities, futures, and options (How to Use Thinkorswim: The Ultimate Guide 2021, n.d.). This is an app that I use every day for trading options and stocks. It is also available as a mobile app or downloadable software for Windows computers.

           Thinkorswim has various features and tools available for everyone, from beginners to experts in trading the market. It provides how-to guides and in-depth tutorials on how to get the most out of the platform. For beginners in trading, it offers a demo account for free, which can be used with up to $100,000 in virtual cash. The demo account can be used for virtual paper trading to get to know the platform and its features without spending real money.

           The design of the platform is simple, with the home screen showing only the essential tools. The home screen shows your account information, which can include your account balance, favorite stock watchlist, and open positions. There are different tabs on the home screen for monitoring open positions, performing scans of stocks, stock charts, tools, and an Analyze tab. I like the way the panels are put together in a user-friendly interface. The panels can also be detached as a separate panel, or ‘gadget’, for a multi-window appearance.

Figure 1.

Note: Thinkorswim home screen with chart.

 


            The functionality of Thinkorswim is unique. It uses a programming language called Thinkscript, which is a “built-in programming language that gives you the capability of creating your analysis tools such as studies, strategies, watchlist columns, etc. (Learning Center - ThinkScript, n.d.).” Users of the app can use thinkscript to develop their studies and scan queries using specific criteria. Thinkscript also provides the ability to combine indicators and create your personal strategies based on your trading methods. One of the popular functions is using color coding for the individual gadgets. For example, if more than one gadget or chart is set to blue, and you change the stock ticker (stock symbol) on one gadget, it will also change the other gadgets with the same color to represent that stock.

Figure 2.

Note: Gadget showing Thinkorswim alerts.



  






          They are a few improvements I would suggest for the Thinkorswim app. The app allows you to create alerts that can notify you via text message or email if the price or study of a stock meets a criterion. However, the ability to create alerts on the indicators themselves would be helpful. Secondly, the app uses a lot of local resources, such as memory and processor power. Reducing the number of resources needed would speed up the program since the market moves every second of the day. The difference could be hundreds of dollars if the app cannot keep up with the market. Finally, it needs an easier way to backup all the studies and scans you create with thinkscript. You must save the required files from the program directory and correctly place them in the same directory on a new computer. I suggest an easy one-click back solution for anyone who wants to use the app on another computer.

Marlon

 

References

How to use Thinkorswim: The Ultimate Guide 2021. (n.d.). DAYTRADINGz.Com. Retrieved September 8, 2021, from https://daytradingz.com/how-to-use-thinkorswim/

Learning Center - thinkScript. (n.d.). Thinkscript. Retrieved September 9, 2021, from https://tlc.thinkorswim.com/center/reference/thinkScript


Monday, September 27, 2021

Programming Languages


            This is one of my first experiences building a program. It felt like my previous experience using HTML to create a website. It was interesting learning about the blocks that built the game that I created, and how some of the commands had a common meaning. One of the difficulties I had was keeping one of the commands consistent when I made changes. The solution was to duplicate the command for each instant. For example, the game would stop when I clicked the “run” button. I had to duplicate the command for each variable when “run” is pressed. For the Scratch program, I noticed how commands are repeated, but changes were just made in the variables. The loop commands in Python were like the ‘forever’ commands in Scratch. This is because the “loop” command “repeats the loop's subsequent instructions a specified number of times” (Vahid & Lysecky ,2017).

            I found the Scratch program easier to use because it had a drag and drop interface. The learning curve was small after watching tutorials on YouTube to grasp how the bocks are used in the program. The Python program required manual input, which could cause errors if typed incorrectly. According to Vahid & Lysecky (2017), “humans don't easily think in 0's and 1's”. I found this to be true while using the compiler to convert the high-level language to an assembly language instruction in Chapter 2.10. It was a challenge to keep track of the binary language conversions.  

https://scratch.mit.edu/projects/566654109/

            Some programming languages are best used in certain applications. Python is one of the world’s popular languages and is used for a range of applications such as website creation, task automation, and data analysis (What Is Python Used For? A Beginner’s Guide, 2021). Advantages of java programming include platform independence, portability, stability, and being economically beneficial for most businesses. However, it has complex codes and no backup facility (Advantages and Disadvantages of Java, n.d.). Java is the most popular language currently being used today. It is easy to learn and is used in most of the browsers on the market. JavaScript, in particular, is very popular in game development, web development, and mobile applications. In addition, it requires no prior experience in coding (11 Most In-Demand Programming Languages in 2021, n.d.).

     Technology is always changing and the rate of production increases with it as well. With new developments in programming languages, workers in manufacturing and communication have become more efficient at making processes easier and faster. The modern office has been reshaped with more automation and the ability to reduce costs using technology. Workers in the programming field are necessary to sustain and support the programs that exist today. 

 

 ----------------------------------------------------------------------------------------------------------------------- 

References

11 Most In-Demand Programming Languages in 2021. (n.d.). Berkeley Boot Camps. Retrieved September 6, 2021, from https://bootcamp.berkeley.edu/blog/most-in-demand-programming-languages/

Advantages and Disadvantages of Java. (n.d.). TechVidvan. Retrieved September 5, 2021, from https://techvidvan.com/tutorials/pros-and-cons-of-java/

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

What Is Python Used For? A Beginner’s Guide. (2021, June 24). Coursera. https://www.coursera.org/articles/what-is-python-used-for-a-beginners-guide-to-using-python