After going over my past blogs, I'm glad to see they show how I am learning. I believe I have learned so much and gained an understanding of how businesses work and the systems that allow those businesses to operate. I have learned some technical things such as the components of networking and computing. For the most part I don't think theres anything about the way I am studying or completing assignments that needs to change. The one thing that I may want to change is getting my assignments done a little bit earlier. So far I haven't had any late assignments but they do get close sometimes.
This week I read Chapter 8. We talked about the chapter and took a quiz over it on Tuesday. Then on Thursday we went over the Case Study in this chapter which was about one of the biggest data theft in history. Some guys hacked into TJX networks outside TJX stores who didn't have firewalls set, no encryption, and sent financial information over the wireless network. They were able to gain 45 million credit and debit card numbers. We also went over commonly missed questions on the midterm and how the grading was done. Along with all that, I worked with my group to get our Precampaign Report done for our Google AdWords challenge and submitted that on the student dashboard and on Blackboard.
This week I read the chapter over network security. I learned that every network can be unsecure and has a potential to be hacked or tapped into. Hackers/Crackers use all sorts of programs to obtain information, stop a system, or slow down a system until it is no longer useful. They can do this through the use of viruses, sniffer programs, and worms along with some other means of access into networks. I learned that a very unsecure network is a wireless network because of the ease of being in range to connect to the router and being able to gain access more easily than hard line networks. I also learned that there are plenty of countermeasures for these risks. Firewalls, encryption, and password protocols such as WPA all can stop unauthorized access into a network. That wraps up this blog, like always I hope you enjoyed.
No comments:
Post a Comment