Posts

Showing posts from 2025

Jobs

Network Implementation Engineer — Google Careers https://amazonapprenticeships.co.uk/cyber-security

Research of Switches, Servers and VPN

Managed Switches A managed switch is a network switch that allows the administrator 

Feedback from Mock interview

What questions i should have asked?
Global RTS The trip was in the morning on the 28th March 2025, Will and Patrick organised it. The purpose of the trip was to gain experience in the aviation industry, specifically air traffic control, using a simulator. We were shown how there simulators work and we were shown how to use them as well as being able to communicate using the aviation alphabet. We met people who worked there, learning how to become an air traffic controller. We used there main sim that used 4 big TVs to show a graphically simulated view of a run way from the view of a tower. We also communicated with headsets to simulate how real air traffic controllers communicate to pilots.

Technical and non-technical threats to an organisation

Technical threats Botnets This is a network of computers that have been intentionally infected with malware by cybercriminals to perform automated tasks on the internet. Bot headers use specialized software to try and find a system in the network that is venerable and use it to gain access to the other computers.   Some of the ways to prevent this include using strong passwords, improving your network security, making sure you have a reliable and up-to-date antivirus, etc.   Dos (denial of service) This is an attack made form a computer meant to shut down a machine or network, making it inaccessible to its intended users. A Dos attack is accomplished by flooding the target with TCP or UDP traffic, or sending so much information that it causes the system to crash.   To prevent this, you can make sure that all the software that you use is up to date, installing firewalls, and following other basic cyber security techniques.   DDOS (distributed denial of service attack)...

Project Planning

Project Planning In order to make accurate estimates when budgeting, you must confirm the project priorities, ensuring that the requirements are clear and in order of priority. Ensuring he planning  It is important to develop a financial contingency plan when working on a project. Setbacks and issues can arise suddenly, for example economic downturns, technical failures, losing customers, natural disasters and supplier bankruptcy. Financial contingency planning includes how to respond quickly to such occurrences and ensure hat the project gets back on track. In the virtual tour project we accounted for risks like, if someone was away while we where working. We made sure that we could still work from home to keep the project from lagging behind. We also added in a warning for motion sickness on the website.

The technical and non-technical threats that may cause damage to an organsation

Technical Threats Botnets and DDoS attacks A bot is a type of malware that allows a cyber security attacker to take control of a digital system that has been infected without the user's knowledge. It can result in a botnet which is an interconnected network o infected computer systems   The result of a DoS attack is that users are unable to access the network systems   A DDoS attack has the same aim as a DoS attack, but a DDoS attack uses many digital systems to carry out the attack    A DDoS attack is another type of attempt to make a digital or network system unavailable to its users.   The types of websites that a DDoS or DoS attack affects are usually high profile web servers, such as banks, payment websites and mobile phone companies. Hacking, Cross site scripting, Password cracking software and SQL injections Brute force password cracking is when someone uses every combination of letters, digits and special symbols to find the password.   In a brute f...

Core Component Project

Task 1 Trouble Shooting and testing Task1 focuses on troubleshooting a fault based on a specified set of problems and issues and designing specified set of problems and issues and designing a test plan. You will be given a task brief which will provide information to help you complete this task and the outcomes that are required. You will be provided with further information that will help you to diagnose the fault. There will be two requirements for this task: A troubleshooting document in response to a specified fault  a test plan document You will need to diagnose the fault and record your steps to rectify the specified fault. It is important that you consider which troubleshooting framework and tools you will use during the troubleshooting process. The troubleshooting document could include: User details  Test dates  Computer specification and software  Proposed tests  Expected outcomes of tests  Record of diagnosis The test plan you create must be full...

Quizizz Summart

Image
Questions I found challenging 

Confidentiality, integrity and availability

Confidentiality, integrity and availability This is the CIA triad of data and services Confidentiality - Confidentiality has to do with the privacy of information, including authorizations to view, share, and use it Integrity - Integrity refers to the reliability and completeness of data and includes ensuring information non-repudiation and authenticity Availability - The concept that authorized users have access to the systems and the resources The importance of maintaining CIA: Maintains Security compilance Maintains trust with stakeholders Promotes a positive brand image Avoids secuirty risks and unauthorised access The consequences of not maintaing CIA: Financial: Regulatory fines Refunds/compensation to customers Loss of earnings Legal: Lawsuits Termination of contract Reputational: Loss of clients  Damage to brand Identification, Authentication, Authorisation and Accountability Purpose IAAA is used to support the confidentiality, integrity and Availability security concept ...

Homework due 7/3/25

Amazon Data that will be held by Amazon on there customers: Name  Date of birth Payment information Password  Email Purchasing habits Recent Purchases The impact on the consumer would be that the retailer would have access to a lot of there personal date depending on how often they use the service and how much information they give to the retailer. The retailer would have more data points to suggest new products and keep the consumer on the website. It would also mean that the data held on the user must be held securely and properly to abide by the law. If there was a data breach at amazon this would cause all of that data to be exposed not only making them liable to be sued but also depending on how well they secured the data, they could also be legally challenged for it under GDPR. The impact of this would mean that users Passwords, Emails and Purchasing habits would be leaked and available for malicious actors to use.  The impact on the retailer if a data breach happen...

Principles of Project Planning

Stakeholder Roadmap A stakeholder roadmap provides a strategic overview of the main components of the project. A project plan provides the task-level details of the project that are presented on a timeline.  The difference between the two is that a project plan is far more detailed in the tasks that are meant to be done, while a stakeholder roadmap is more of an overview of a project. A stakeholder roadmap a strategic view of the project and does not include the day-to-day tasks. Nor does it include a detailed view of the roles and responsibilities and who will be working on what part of the project. It is used to help the project team present a quick overview of the project status to other teams which may include investors, executive staff and departments within the organisation. Project timeline The timeline shows what phases of the project are in the past, what the current progress is and what is still left to do to complete the project. It therefore is still left to do to compl...

How to connect two different networks using Cisco Packet Trace

Image
How to connect two different networks using Cisco Packet Tracer 1. First you need to deploy at least two end devices to a separate switch. 2. Second you must then assign an IP address to each end device 3. Computer 1 Network 1 IP: 192.168.10.2 4. Computer 2 Network 1 IP: 192.168.10.3 5. Computer 1 Network 2 IP: 192.168.20.2 6. Computer 2 Network 2 IP: 192.168.20.3 7. Then add in a Router for each network, connecting it to the switch 8. Then set the IP address in the router as such: 9. Router 1 IP to the Switch 1: 192.168.10.1 10. Router 1 IP to Router 2: 192.168.30.1 11. Router 2 IP to Switch 2: 192.168.20.1 12. Router 2 IP to Router 1: 192.168.30.2 13. Then set the default gateway on every device to the same as the Router IP to Switch 14. Then go into Router 1 and create a static route to the other network, set the network to 192.168.20.0 then set the mask to 255.255.255.0 after that set the next hop to the Router 2 IP (192.168.30.2). This will give router 1 the information needed to ...

Mock Interview Exercise

Questions When was the last time you upgraded you systems? How old is your infrastructure? What type of software do you use for your network? How do you manage your company devices? How many people currently use the network? How often do you have issues with your network? How secure are the passwords used on you network? How often do you change the passwords on your network? Do you have security cameras around your server rooms? Do you a good firewall to protect against unwanted traffic? Have you setup access levels for each type of employee/user? What is the budget for the project? What are you objectives for the project? What is the time span of the project? How much do you want improved on your network? Interview They upgraded there systems last around 6 years ago (2019) The oldest part of the network is around 10 years old (2015) They use Windows Server, they didn't know the version (most likely 2019) They monitor who has access to that device, they can access any device if the...
  College information.    Personal   Employee contact  Employee bank information  Employee address   Employee sexuality, gender and sex.   Employee DOB  Student contact  Student exam results and previous schools  Student parent contact   Student address  Ehcp medication   Ehcp medical records  Ehcp contact information for doctor and parents.  Commercial    Employees and student's names and information  The network IP, data etc   Contacts to other companies       How it is secured    Ways that this data and information is secured include:  Encryption  Locking access to information behind specific accounts   Restricting the access to these accounts and encryption keys   Firewalls   VPN’s  2FA  Anti-virus software   Training staff to make sure that they don't fall for phishing emails.     How to present the findings ...

Principles of Project Planning

Project Aim and Objectives & Scope Activity Sheet   Project Name: Gloscol VR Project   Date: 28.2.2025     1. Defining the Project Aim   The project aim outlines the broad goal or purpose of the project. It should capture the overall vision and answer the question, “What is the main purpose of this project?”   Questions to Consider     What is the overall goal of this project?     To create a virtual tour of the college that can be viewed on VR as well as a desktop or phone.       What problem is this project solving or what opportunity is it creating?     We need to mak e it easier for people to see the college through a VR lens specifically those who cannot entire the college. Or can’t attend open evenings       Who will benefit from this project (stakeholders, customers, team members)?     The main stakeholders of the project are the potential students coming to the college w...