Posts

Showing posts from May, 2022

Initial Project Plan (Gantt Chart )

Image

Essay (Conclusion)

                                   EASSY ( CONCLUSION ) In the current world that is run by technology and network connections, it is crucial to know what is cyber security and to be able to use it effectively. Systems, important files, data, and other important virtual things are at risk if there is no security to protect it. Whether it is an IT firm not, every company has to be protected equally. Cyber security  is a process of protecting sensitive data, networks, and software applications from the cyber attacks. Cyber attacks can be considered as an exploitation of resources, unauthorized access to the systems, ransomware attacks to encrypt data and extract money. The days when it was enough to only have a strong password are  long gone, and our personal and work data is exposed to many dangers.   References https://cwatch.comodo.com/ https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_overview.htm# https://www.bitdegree.org/tutorials/what-is-cyber-security/ https://www.g

Essay (Main Body)

                                    ESSAY ( MAIN BODY ) PURPOSE OF HACKING Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known  event of hacking had taken place in 1960 at MIT and at the same time, the term " Hacker " was originated. Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer. Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking. A computer expert who does the act of hacking is called a "Hacker". Hackers are those who seek knowledge, to understand how systems operate,

Essay (Introduction)

                             ESSAY ( INTRODUCTION ) WHAT IS HACKING  Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system. Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. System hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.

Computer Ethics

                                COMPUTER ETHICS      Computers are special technology and they raise some special ethical  issues . In this essay I will discuss what makes computers different from other technology and how this difference makes a difference in ethical considerations. In particular, I want to characterize computer ethics and show why this emerging field is both intellectually interesting and enormously important.      On my view, computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. I use the phrase "computer technology" because I take the subject matter of the field broadly to include computers and associated technology. For instance, I include concerns about software as well as hardware and concerns about networks connecting computers as well as computers themselves.      A typical problem in computer ethics arises because

Initial Idea 2

Image
                                                                                                      INITIAL IDEA 2 HACKING Nowadays, different people have different views on the hacking scene. Often times people of similar skill level have similar opinions. There is no official definition of a hacker, rather a vague idea amongst the masses. In  addition, the media loves to add false information to draw audiences’  attention across the nation, for the pure sake of money. “Hacking” was first used in relation to using techni cal know-how back in 1955  at a meeting of the Technical Model Railroad Club . In the meeting minutes, it was used to describe how members modified the functions of their high-tech train sets. The First Internet Hacker One of the first Internet Hackers , and certainly the first to gain mainstream media attention, was  Robert Morris back in 1989 . His was the first “Denial of service” attack in history and it was caused by a worm Morris had  developed at Cornell U

Software/Hardware Skills

                                                        Software / Hardware skill           No matter what industry you work in computers are becoming more commonplace, so you will       likely need at least basic computer skills to do your job effectively. if you are good with computers, it is important to list your computer skills on your resume for hiring managers to see.  I know about Microsoft Word, Excel and PowerPoint as well as Microsoft Windows, Mac and Linux operating system. I had the opportunity to participate in a training where I expanded my Knowledge and also improved my skills.  During COVID-19 , I'm also learnt about hacking specially on Linux OS . Hardware skills allow allow you to physically operate a computer. Hardware skills can be simple as knowing how to turn devices on and off. They might also involve more complex tasks like connecting machines to networks, changing parts or fixing broken devices. 

Initial Idea 1

Image
INITIAL  IDEA  1                                                                   APP  DEVELOPING       I want to invent software that can help people all over the world. Such as computer science give you possibility to change the world apps like PayPal or Uber have already changed the lives of millions of people. I have the chance to make a revolution.   PayPal is the fastest way to accept Payments worldwide. PayPal is the simpler, safer way to do transection. PayPal services allow people to make financial transactions online by granting the ability to transfer funds electronically between individuals and businesses. The PayPal app is available online or at the iTunes App store and Google Play.                                                                   Uber is a transportation company with an app that allows passengers to hail a ride and drivers to charger fares and get paid. Using a ridesharing app like Uber has several advantages over more traditional transportation me

Introduction post

                                                      INTRODUCTION POST  To select a university is not easy decision. It took me to two months to decide. I have searched for different universities like De Montfort university , Bedfordshire university, Canterbury Christ church university. But finally select the De Montfort university . Because DMU is recognized on multiple front for providing an excellent teaching environment, as well as providing opportunities that aim to give students the best experience possible. The department of education awarded DMU university a gold rating in the teaching excellence framework in 2017. DMU is one of the top public university in Leicester England. DMU has well qualified tutors and teachers who have several year of industrial experience which will help me during my study. DMU has provided academic or non academic facilities like high teach class rooms, library, students services, cafeteria, gymnasium and more many.  If we talk about my course i