Friday, June 10, 2011

DNS ♥


3 tahun bersama.. rasa sayang nk tinggal semua ni..
nk tinggal member DNS.
member rumah.
aunty n uncle yg rajen sgt bergosip..:P
ipoh yang happening.
mesti rindu nanti!
lepas ni semua buat hal masing-masing..
kalo ada yang dapat sambung ijazah tempat yg sama tu, Alhamdulillah..
apa-apa pon, mereka sgt istimewa.
byk yang kenangan dengan diorg.
start sem 1 sampai sem 6..
diorg sahabat terbaikk..:)
susahh nk cari kawan mcm diorg..
susah sama-sama.. senang sama2.
best bila ingat pegi umah ustzah time raya..
pegi teluk batikk.
makan2 ngan cik shardilla..
mandi air terjun ulu chepor..
makan kfc for the last time we met..
huh, sgt sedih nk pisah ngan diorg..
tapi x pelah.. biar jarak memisahkan jasad bukan hati
buat sahabat semua..
maafkan aku atas semua kesilapan aku sepanjang perkenalan kita.
mungkin ada yang x suka cara aku bergurau.
terasa hati dan sebagai nya.. harao dimaafkan..
semoga berjumpa lagi..
sweet moments..
DNS PUO



















3P

assalamualaikum..:)
mula 11 Mei 2011 sampai 9 Jun 2011...
2 hari pertama , kelas softskill ngan mr sukhdev. best..:)
byk main jer.. more to communication skill..
input ada.. cuma nk pegi kedepan tu still gemuruh lagi. err.apa ubatnye eh..? :P
then lepas tu, mula la kelas ENSA. Mr Reynold Chua.
sian dia. student ramai yg x beri perhatian... especially aku..:)
bkn sbb pe.. terlalu byk yg kena cover dalam 1 hari. rasa mcm malas pon ada.
tapi apa2 pon. Alhamdulillah. rezeki, lulus cukup2 makan..
2 mggu kelas ENSA, abes exam, mula plak kelas ECSS.
kali ni Mr. Ravi. kelas ni semua tumpu perhatian.. x mcm kelas ENSA, semua buat hal sendiri..
maybe sbb Mr,. Ravi ni suara kuat n byk main..heheh.. mcm2 game..
2 mggu lepas ECSS Alhamdulillah semua lulus. tahniah buat semua.. ♥♥♥
abes 3P, tamat la sudah tugas aku sbg student kat PUO ni..
mcm sedih la plakk.. byk kenangan kat sini...
member, lecturer, suasana dalam kelas n lab.
besssttt sgt..
pe pe pon. semoga berjumpa lagi.

Saturday, May 7, 2011

ICND 2

err.. salam..
da lama x post kat sini.. :P
busy skett..
bukan busy ape.. busy ber fb.. hehe
td pagi baru abeh bootcamp icnd..
adehh. 4 hari nk sumbat semua syllibus.. haihhh~
tapi ok gak la.. at least ley refreshh balik utk persediaan..
kalo x, x der nye aku nk ngadap nota nk tgok balik..
tima kaseh cik mimah..
lecturer yang berdedikasi...
susah payah cik prepare soalan suma..
suma sbb cik nak tgok student cik berjaya..
sama lah mcm netrider dulu..
penat lelah cik x penah peduli..
terima kasih..
preparation da buat..
skang ni atas diri sendiri plak nk ulangkaji balik..
err.. takott.
masa latihan x per la. byk masa nk jawab..
nnt..
dengan ketaqnya..
dengan kejar masa nyaa..
emm..
berserah je laa..
doakan yg terbaikk..
kita cuma merancang.. Tuhan yang menentukan.. ~
redho saja apa keputusannya nnt.
:)

Wednesday, April 13, 2011

F5108 -CHAPTER 1 -cont INTERNET SERVICES n ATTACK

INTERNET SERVICES


ELECTRONIC MAIL AND NEWS

  • ways for people exchanging information without requiring immediate n interactive response.

FILE TRANSFER

  • exchange files.

REMOTE ACCESS TO HOST

  • log on from a distant location

REAL TIME CONFERENCING SERVICES

  • Online (video conference)

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


ATTACK


1. information theft

:: allow attacker to get data without directly use our computers. ::


how >> - dumpster diving n steal email

used for>> - to access bank account or to make loan



2. unauthorized disclosure


::employees leaking confidential information to attacker or attacker planted spies in order to steal information ::


how>> -planting virus, trojan horse or snooping software



3. information warfare



::remotely disabling target using software , disinformation >> false /inaccurate information that is spread deliberately ::



4. Accidental data loss



::caused by coincidently delete wrong file , usually causing by careless employee or untrained employee::


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


SECURITY THREAT


categories :

  1. data disclosure - exposure data to third parties. key point to ensure that disclosure are relevant and necessary
  2. data modification
  3. data availability

activities :

  1. hacking - modifying computer hardware n software
  2. cracking -breaks into someone computers system pr bypass password or licence in computer programs.




F5108 -CHAPTER 1 -cont SECURITY MODEL

OPEN SECURITY MODEL

  • easy to implement
  • few security measures
  • simple password
  • assume all users are trusted protected asset minimal and threat are minimal.
  • free access for user
  • implement data backup system in most case.

RESTRICTIVE SECURITY MODEL

  • More difficult to implement
  • more security measures
  • firewall and identity server.
  • some user are not trustworthy , protected asset are substantial and threat are likely to occur
  • LAN that connected to WAN or internet usually use this type of model.

CLOSED SECURITY MODEL

  • most difficult to implement
  • all security measures
  • assume all user are not trustworthy, protected asset are premium
  • user access is difficult
  • organization require high number and trained network admin to maintain tight security
  • network admin need to have high skills and more time to administer

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

SECURITY METHOD


  • log on - log on form
  • File system - can access only certain file + encrypt data along transmission
  • Data Communication -encryption confidential data
  • Administrative -different level user have different privilege access + admin define the rules.


F5108 -CHAPTER 1 -cont definition of ASSET OF IDENTIFICATIN, VULNERABILITIES ASSESSMENT AND THREAT IDENTIFICATION

(asset identification :

  • tagging devices or intangible asset (database) with physical label (barcode) or Radio Frequency Asset
  • to avoid competitors take an advantages when asset lost

Vulnerability Assessment :

  • search for a weakness in order to apply a patch or fix to prevent a compromise
  • ways: eg- installing vendor patches and implementing or virus scanning software.

threat identification :

  • listing all possible threat that can be occur.