Friday, June 10, 2011

DNS ♥


3 tahun bersama.. rasa sayang nk tinggal semua ni..
nk tinggal member DNS.
member rumah.
aunty n uncle yg rajen sgt bergosip..:P
ipoh yang happening.
mesti rindu nanti!
lepas ni semua buat hal masing-masing..
kalo ada yang dapat sambung ijazah tempat yg sama tu, Alhamdulillah..
apa-apa pon, mereka sgt istimewa.
byk yang kenangan dengan diorg.
start sem 1 sampai sem 6..
diorg sahabat terbaikk..:)
susahh nk cari kawan mcm diorg..
susah sama-sama.. senang sama2.
best bila ingat pegi umah ustzah time raya..
pegi teluk batikk.
makan2 ngan cik shardilla..
mandi air terjun ulu chepor..
makan kfc for the last time we met..
huh, sgt sedih nk pisah ngan diorg..
tapi x pelah.. biar jarak memisahkan jasad bukan hati
buat sahabat semua..
maafkan aku atas semua kesilapan aku sepanjang perkenalan kita.
mungkin ada yang x suka cara aku bergurau.
terasa hati dan sebagai nya.. harao dimaafkan..
semoga berjumpa lagi..
sweet moments..
DNS PUO



















3P

assalamualaikum..:)
mula 11 Mei 2011 sampai 9 Jun 2011...
2 hari pertama , kelas softskill ngan mr sukhdev. best..:)
byk main jer.. more to communication skill..
input ada.. cuma nk pegi kedepan tu still gemuruh lagi. err.apa ubatnye eh..? :P
then lepas tu, mula la kelas ENSA. Mr Reynold Chua.
sian dia. student ramai yg x beri perhatian... especially aku..:)
bkn sbb pe.. terlalu byk yg kena cover dalam 1 hari. rasa mcm malas pon ada.
tapi apa2 pon. Alhamdulillah. rezeki, lulus cukup2 makan..
2 mggu kelas ENSA, abes exam, mula plak kelas ECSS.
kali ni Mr. Ravi. kelas ni semua tumpu perhatian.. x mcm kelas ENSA, semua buat hal sendiri..
maybe sbb Mr,. Ravi ni suara kuat n byk main..heheh.. mcm2 game..
2 mggu lepas ECSS Alhamdulillah semua lulus. tahniah buat semua.. ♥♥♥
abes 3P, tamat la sudah tugas aku sbg student kat PUO ni..
mcm sedih la plakk.. byk kenangan kat sini...
member, lecturer, suasana dalam kelas n lab.
besssttt sgt..
pe pe pon. semoga berjumpa lagi.

Saturday, May 7, 2011

ICND 2

err.. salam..
da lama x post kat sini.. :P
busy skett..
bukan busy ape.. busy ber fb.. hehe
td pagi baru abeh bootcamp icnd..
adehh. 4 hari nk sumbat semua syllibus.. haihhh~
tapi ok gak la.. at least ley refreshh balik utk persediaan..
kalo x, x der nye aku nk ngadap nota nk tgok balik..
tima kaseh cik mimah..
lecturer yang berdedikasi...
susah payah cik prepare soalan suma..
suma sbb cik nak tgok student cik berjaya..
sama lah mcm netrider dulu..
penat lelah cik x penah peduli..
terima kasih..
preparation da buat..
skang ni atas diri sendiri plak nk ulangkaji balik..
err.. takott.
masa latihan x per la. byk masa nk jawab..
nnt..
dengan ketaqnya..
dengan kejar masa nyaa..
emm..
berserah je laa..
doakan yg terbaikk..
kita cuma merancang.. Tuhan yang menentukan.. ~
redho saja apa keputusannya nnt.
:)

Wednesday, April 13, 2011

F5108 -CHAPTER 1 -cont INTERNET SERVICES n ATTACK

INTERNET SERVICES


ELECTRONIC MAIL AND NEWS

  • ways for people exchanging information without requiring immediate n interactive response.

FILE TRANSFER

  • exchange files.

REMOTE ACCESS TO HOST

  • log on from a distant location

REAL TIME CONFERENCING SERVICES

  • Online (video conference)

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


ATTACK


1. information theft

:: allow attacker to get data without directly use our computers. ::


how >> - dumpster diving n steal email

used for>> - to access bank account or to make loan



2. unauthorized disclosure


::employees leaking confidential information to attacker or attacker planted spies in order to steal information ::


how>> -planting virus, trojan horse or snooping software



3. information warfare



::remotely disabling target using software , disinformation >> false /inaccurate information that is spread deliberately ::



4. Accidental data loss



::caused by coincidently delete wrong file , usually causing by careless employee or untrained employee::


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


SECURITY THREAT


categories :

  1. data disclosure - exposure data to third parties. key point to ensure that disclosure are relevant and necessary
  2. data modification
  3. data availability

activities :

  1. hacking - modifying computer hardware n software
  2. cracking -breaks into someone computers system pr bypass password or licence in computer programs.




F5108 -CHAPTER 1 -cont SECURITY MODEL

OPEN SECURITY MODEL

  • easy to implement
  • few security measures
  • simple password
  • assume all users are trusted protected asset minimal and threat are minimal.
  • free access for user
  • implement data backup system in most case.

RESTRICTIVE SECURITY MODEL

  • More difficult to implement
  • more security measures
  • firewall and identity server.
  • some user are not trustworthy , protected asset are substantial and threat are likely to occur
  • LAN that connected to WAN or internet usually use this type of model.

CLOSED SECURITY MODEL

  • most difficult to implement
  • all security measures
  • assume all user are not trustworthy, protected asset are premium
  • user access is difficult
  • organization require high number and trained network admin to maintain tight security
  • network admin need to have high skills and more time to administer

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

SECURITY METHOD


  • log on - log on form
  • File system - can access only certain file + encrypt data along transmission
  • Data Communication -encryption confidential data
  • Administrative -different level user have different privilege access + admin define the rules.


F5108 -CHAPTER 1 -cont definition of ASSET OF IDENTIFICATIN, VULNERABILITIES ASSESSMENT AND THREAT IDENTIFICATION

(asset identification :

  • tagging devices or intangible asset (database) with physical label (barcode) or Radio Frequency Asset
  • to avoid competitors take an advantages when asset lost

Vulnerability Assessment :

  • search for a weakness in order to apply a patch or fix to prevent a compromise
  • ways: eg- installing vendor patches and implementing or virus scanning software.

threat identification :

  • listing all possible threat that can be occur.

Tuesday, April 12, 2011

F5108 -CHAPTER 1

INTRODUCTION TO NETWORK SECURITY

definition :

- protection of network n their services
- protects from : unauthorized modification , destruction n disclosure
- ensure d network performs it function correctly n no harmful side effect. ~


concepts :

-start with authentication (user)
- Firewall enforces access policies (whether allowed or not )
- antivirus or IPS help to detect n inhibit action of such as malware.
-audit (for analysis purpose)
-communication in network must be encrypted.


goal:

  • confidentiality - privacy .
  • integrity
  • availability- ensure that network doesn't down n still up every time.
potential risk :

  • email attachment -open attachment n worms or virus will spread on to network
  • diversionary tactics - slip in attack another part of network while admin recovering the services
  • blended attack - virus or worm may be execute themself and attack more than one platform
  • renaming document - subject name changed causing the document can't be open by receiver.

Monday, April 11, 2011

Cisco Lifecycle Services

  • The Prepare Phase
- we must ensure that the network can be supported the goals of organization based on business case.
-establish financial justification for network strategy.. ~


  • The Plan Phase
- identifying initial network requirement based on goal, facilities, user need n other factors.

- characterizing sites n existing network (only it is for upgraded)

- A project plan is useful to help>>>> manage the tasks, responsibilities, critical milestones, and resources required to implement changes to the network.

- Project Plan should align with the scope, cost, and resource parameters established in the original business requirements.


  • The Design Phase

- Design based on information (goals, requirement n others) that are collected during prepare n plan phase. :)


  • The Implement Phase

- after design approved, implementing the network will be build. >> according to design specification...


  • The Operate Phase

-maintaining the netwirk day to day..


  • The Optimize Phase

-redesign the network if the network not supported the requirement needed n maybe doesn't meet the expectation...~


shortcuts ...= >>> PPDIOO :)

♥ ♥ ♥

Terciptanya cinta terciptalah rasa

tercipta cinta tercipta rindu

tercipta episod penuh berwarna

antara kau dan aku...


terasa segalanya, sempurna tanpa cela

lihat dari hati bukannya diri

bagai puteri menanti putera

kasih antara kita


walau dipukul kuat ombak cinta

melayang jauh jauh seketika

kembali kerana cinta

terasa bagai dingeng kisah asmara

berputik kerna rasa

kasih yang tercipta antara kita


terciptanya kita tercipta rasa

tercipta cinta tercipta rindu

terasa semuanya sumpahan antara kita..


Sunday, April 10, 2011

CHAPTER 1 F5221 DONE..~

ok,
entries below are about designing a good network. ~
it starts with steps to design network, then followed by hierarchical network design, requirements that affect weather portion of network or affects entire of network. last entry is about server farm. there is a big part that must be "master" in chapter 1. also including in chapter 1 are, DMZ, Firewall, Redundancy. all are about designing a network which is need to have availability, security, scalability and manageability.. ~

so has, u need to ensure that your brain can absorb all of this. and make sure u will remind it back before u sleep.. chaiyok2..;p

chapter 1 is already done. tomorrow we will continue with chapter 2.
interesting PPDIOO..;p

heeee .. ~

SERVER FARM


Managing and securing numerous distributed servers at various locations within a business network is difficult. so, we used ---> centralizes servers in server farms. Server farms typically located in computer rooms and data centers.

benefits:

  • Network traffic enters and leaves the server farm at a defined point. This arrangement makes it easier to secure, filter, and prioritize traffic.
  • Redundant, high-capacity links can be installed to the servers as well as between the server farm network and the main LAN. This configuration is more cost-effective than attempting to provide a similar level of connectivity to servers distributed throughout the network.
  • Load balancing and failover can be provided between servers and between networking devices.
  • The number of high-capacity switches and security devices is reduced, helping to lower the cost of providing services.

requirements affects... ~



click to make it showed larger. i don't know how to show it originally large..hhehe;p

HIERARCHICAL DESIGN

Goals of the Core Layer

The Core Layer design enables the efficient, high-speed transfer of data between one section of the network and another. The primary design goals at the Core Layer are to:

.... Provide 100% uptime...(availability)
.... Maximize throughput... (availability also)
.... Facilitate network growth...(scalability)


Core Layer Technologies


  • Routers or multilayer switches that combine routing and switching in the same device
  • Redundancy and load balancing
  • High-speed and aggregate links
  • Routing protocols that scale well and converge quickly, such as Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF) protocol


Distribution Layer Routing


The Distribution Layer represents a routing boundary between the Access Layer and the Core Layer. It also serves as a connection point between remote sites and the Core Layer.


The Access Layer is commonly built using Layer 2 switching technology. The Distribution Layer is built using Layer 3 devices. Routers or multilayer switches, located at the Distribution Layer, provide many functions that are critical for meeting the goals of the network design.

These goals include:

  • Filtering and managing traffic flows
  • Enforcing access control policies
  • Summarizing routes before advertising the routes to the Core
  • Isolating the Core from Access Layer failures or disruptions
  • Routing between Access Layer VLANs


- Distribution Layer devices are also used to manage queues and prioritize traffic before transmission through the campus core.



Access Layer Management

Improving the manageability of the Access Layer is a major concern for the network designer. Access Layer management is crucial due to:

The increase in the number and types of devices connecting at the Access Layer
The introduction of wireless access points into the LAN


Designing for Manageability

In addition to providing basic connectivity at the Access Layer, the designer needs to consider:

  • Naming structures
  • VLAN architecture
  • Traffic patterns
  • Prioritization strategies



step to design a network and basic network requirements. ~

step required to design a good network.
  • verify the technical needs.
  • determine the features and function required to meet need identified above.
  • perform a network readiness assessment.
  • create a solution and site acceptance assessment.
  • create a project plan.

basic network requirements

1. scalability

- to ensure that the network are able to growth or upgrade. mean that, if customer need to expand their network or business, the network that are applied before can be upgraded and expands.

2. availability

- network must be up 24 hours a day, 7 days a week. failure of a single link shouldn't impact the network performance. ~

3. security

- a good network design must be implemented with security such as firewall, IDS, IPS lagii apa ea..? emm. antivirus and so on..;p

4. manageability

- network that are complex will not work efficiently and effective. a staff management must be required to manage network.

Sunday, April 3, 2011

mental dan fizikal... :P

Netrider ari tu x der rezeki.. x der dalam senarai top 10 pon. cik mimah (lect) cakap, saya no 11.. x to ler btol ke x.. ~ err. tekanan la jugak dengaq. x per la. redho saje. da x der rezeki nk wat cemana. but still puas ati sebab dapat markah round2 (praktikal) antara yg highest. heee. 9 org dapat markah terbaik. 3 org dari PUO.saya, faris dan nizam.. Alhamdulillah.. teori K.O.. kalo x, maybe boleyh bantu dapat top 10. hee.

da settle Netrider, skang nga fokus final exam. soalan sumer selaras seluruh Politeknik. doakan yg terbaik.. insyaAllah..

abes final, fokus CCNA. bootcamp 3 ari, then test.9 MEI. waa. tatot2.. bole ke x nak lulus. ;P ..

11 MEi plak, start kursus 3P. dapat course Council Network Security Certification (ENSA & ECSS).. waaa..tekanan btoi la tera nk tggu abeh sem ni.. aiyaa..~ try jer attend. lulus x lulus belakang kira. ;p

kesimpulannye, bln nanti ler baru nk leyh cari keje pe sume. x sabo da ni nk pegang duet sendiri.. tapi keje apa yer...............?

Wednesday, March 30, 2011

Netrider oh Netrider..

salam sume. :)
pejam celik pejam celik, da 3 hari da kat psa ni.. psa a.k.a politeknik shah alam.hehe
taw ape saya buat kat sini..?
saja jer penuhi permintaan lecturer.. hoho..
bootcamp semnggu utk competiton netrider..
hoo.. denga nama pon cem gerun kan..?
ntah ler. . boleyh buat ke x ntah..
dalam kelas semua ok. bila nk study sendiri, keje nk lentok jer.. haih.. ~
ari sabtu ni, ntah cemana..
top 10 tu susah nk dapat.
semua terrer2..
ni baru poli nye team..
x tgok team University lagi..
maw pengsan haa. :)
pe pon.. doakan yg terbaik.. InsyaAllah, ada rezeki, ada la top 10 nye..
kalo x der, x per laa.. ~ redho.. :)

.........................................................................................

Sunday, February 13, 2011

my self.. :)

waaa..
dah lama x update. boring lak. akceli ni tgh pening wat report projek..
hehhe.. ari tu memamin.. ni lect nak tgok baru hegeh2 nk buat.. hehhe..
biasa.. nama pon has.. ;)
so, ari ni nk cerita sket sal saye.. baru nk introduce ni. hhehe.
nama caye ni. Hasnidar bt Harun. mak cakap, nama tu ustaz kat Johor dulu yang suggestkan..
maksudnya.. "Gudang kecantikan. " kaitan.?
entoh. hee.. time tu mak cari nama yg start huruf H.
semua famili caye ni semua huruf H. tu yg amek nama tu..:)
apa2 je la. yg pasti, caye suke nama tu.. hehehe..
ok. lahirnya budak name hasnidar ni pada 11 oktober 1990.
time tu family still kat Johor.
jauhkan..? sebabnye abah caye ini askar. pindah merata le.
14 hari umur caye ni. x dan abeh pantang , family kena pindah pi taiping. hheehe..
dekat taiping x lama.. 2 taun jer kot. pastu abah pencen.
pindah la kami ni ke Sungai Petani kedah yang indah lagi menarik. heee..
da masuk 6 taun, mak antaq pi tadika Taski Abim dekat2 ngan umah jugak.
igt lagi mak kayuh basikal antaq. sian mak.. :(

em.. da abeh tadika, dapat result yg cemerlang.
cemerlang ke.? haha.. x igt.;p
masuk darjah satu kat SK Sungai Layar. dekat jer kat umah. kalo caye nangis kat cekolah pon, mesti mak yang dekat umah leyh dengaq. heee.
time sekolah, caye budak malas jugak. paling besh subjek math. hehe
cikgu latipah. garang woo.. dan igt lagi cikgu penah kasi gelaran bintang kat caye sbb caye dapat markah tggi math. antara yang tinggi la. yg laen ramai lagi dapat markah tggi.
best oo cekolah rendah. jadi pengawas kesihatan. hee. sbb sehat sgt kot..;p
jadi pengawas pusat sumber. hoho.. baca buku malas..;p

pastu da abeh UPSR semua. alhamdulillah dpaat elok gak.
x taw la pemeriksa kecian ke apa.
dia kaci 4A 1 B dan semestinya B itu adalah .. Bahasa Inggeris. yey!
subjek plg x cuke.;p
dapat tawaran g Sekolah Men keb Agama Yan.
Cekolah idaman.;)
kat sini best. form 1 sampai form 5. ada saja yg manis.
my best friend, husnna. since form 1 sampai form 5 kelas yang sma.. hee
kelas hidayah. kelas no 3. haha. x berganjak sebb x dak peningkatan.. has2..
plg sedeyh, spm terok. ish2.. mak pon sedeyh. maaf mak.:(

emm.. then da abes spm. tggu tawaran mana pon x dapat.
cedih oo.. matrik da confirm x dapat. sbb fizik kimia hebat sgt. depa takot nk bg peluang..hee
emm.. so, wat keputusan pi la wat stpm kat agama kedah.
2 mggu kat sana, x suka sgt environment. peraturan x ketat. sampai pelajar dya x ikot lansung. kami pelajar baru ni, smapia x taw nk ikot mana satu.
pakaian, waktu pa suma lah. pening2.
tapi subjek2 dya menarik. saya minat..;p
ada arab, pengajian am. ekonomi.
boleyh la.. minat la jugak. hee
2 mggu kat sana, tetiba dapat tawaran mai poli. err.
kos network. apatuh.? time tu x taw pa lansung.. x maw.
sbb da tekad nk belajaq sungguh2 kat agama kedah..
tapi apakan daya. abang mak suma nk caye g poli.
x pe la. ikot yang berpengalaman..;)
so, 2008. saya start belajar di poli ipoh. hoo. nk kata best tu, biasa ja.
1st semester, nanges kat lect sbb x boleyh nk catch up menda apa lect cakap. hee..
then seterusnya ok la. semua ok. sampai skrg. 6th semester. tggu time nk grad.
tu pon kalo berjaya siapkan projek akhir ni. pening2..
hee.. masa depan..? x taw la..
nk sambung degree ke. nk keje ke..
adoih..
itu sahaja dari caye.. :)

yang boring..hee