Study
Network Technologies and Tools
Network technologies
Operating systems (Windows, Linux)
An operating system (OS) is a system software that sits between the software application a user interacts with and the computer hardware such as input and output devices like a mouse or printer, central processing unit (CPU), and random access …
Read MoreProject Management Methodologies
Waterfall and agile methodologies are the most documented for project management. Waterfall is seen as traditional which is more applicable to traditional industries like construction, whereas agile is often referenced in software development. In most IT projects, depending on what stage they are …
Read MoreConcepts Issues Risks When Managing Networking and Cybersecurity Projects
Concepts
A concept is an idea of a project which could be installing software, configuring the network, running a penetration test, writing a business continuity plan, etc. Since it is an idea, it normally refers to a proactive approach such as planning for blue teaming and red teaming events …
Read MoreProject Lifecycle in Networking and Cybersecurity
A project lifecycle can include the six stages: conception and start up, definition of the project, planning, launch and execution, closure, and post-project evaluation.
Concept and start up
The concept and start up phase includes identifying a problem and possible project owners to conduct the …
Read MoreBalance Between Restricting and Enabling Access
A balance needs to be struck between restricting and enabling access for legitimate users because security should be implemented where practicable to comply with local data protection regulations, such as the United Kingdom General Data Protection Regulation (UK GDPR), without impeding business …
Read MoreMethods of Identity Management and Authentication
Identity Management
Single Sign-On (SSO) allows users to sign into multiple platforms with a single set of login credentials. The common SSOs are Google, GitHub, Microsoft, LinkedIn, Facebook. SSO uses what the user knows. Signing in is now convenient because a user only needs to remember one …
Read MoreAccess Control Techniques
Discretionary Access Control
The Discretionary Access Control (DAC) model is the least restrictive whereby it does not rely on the administrator to set roles, thus the power is distributed to the owner, i.e. the person who created the object which could be a file or directory. The owner has full …
Read MoreTypes of Access Control From a Physical Logical and Administrative Perspective
Physical perspective
Access control from a physical perspective is a security system that grants or denies people access into a building or an area. Only authorised employees and visitors are allowed into the premises. Credentials can be verified usually with what the person has which is a staff …
Read MoreRole of Access Control
Role of access control
Access control is a set of protocols that acts as gatekeepers to blocks unauthorised users and devices from accessing a private network, or give restricted access to external users. The policies prevent unwanted intruders from entering the network or data from leaving. Access …
Read MoreEffectiveness of Different Transmission Methods
Half duplex vs Full duplex
Half duplex can communicate in only one direction at a time. E.g. a radio (walkie-talkie) whereby
only one device is allowed to send data and the other devices can receive.
The advantage of using a half duplex is it is used in Wi-Fi as evidenced in the download and …
Principles of Signal Theory
Signal Theory is the study of how information is transmitted between two or more entities, also known as peers, in a communication system. The digital signals are a series of pulses made of denoting on and off or 1’s or 0’s which can be digital or analog waves. Digital signal processing (DSP) is a …
Read MoreMain Elements of Data Communication Systems
Data communication happens between two computers: a client and a server. The main elements of data
communication systems consist of a sender, receiver, protocol, message,and transmission medium.
A sender and a receiver are an endpoint device, a client or a server. This could be a computer,
mobile …