Sunday, January 30, 2022

Week 7 Posting - Genesis Perez

AAA and Network Security

The purpose of AAA is primarily focused on control accessibility and who are authorized to gain access to a specific network. The authentication session is when a computer must present credentials such as username and password. In addition, security tokens are eligible for authentication purposes. If the credentials pass this session, it moves onto the authorization session. The computer is required to abide by certain policies determining which resources and services are allowed for access. Some of it may be limited access to bandwidth, applications, and the time of accessibility. Lastly, the accounting session focuses on auditing or monitoring time and data resources that are being used, which includes logging data traffic and bandwidth usage (Meyers, 2018, pp.371-372). To strengthen this security philosophy, two standards were developed to support it, which are RADIUS and TACACS+. 

One of the standards for AAA is called RADIUS which stands for Remote Authentication Dial-In User Service. This standard was created assisting ISPs connection to a centralized database by connecting a vast number of computers and modems. The three devices that operate within a RADIUS session are the RADIUS server, several network access servers (NASs) and a group of systems that works their way to connect to the network. Microsoft uses Internet Authentication Service (IAS) whereas Linux uses FreeRADIUS (Meyers, 2018, pp.372-373) The second standard for AAA was developed by Cisco to support multiple routers and switches that are working in the network. Cisco called it Terminal Access Controller Access Control System Plus (TACASC+). The more machines are involved, the more chaotic and complex it may be to maintain and monitor. That is where TACASC+ comes in and operates to make sure the network runs smoothly. Unlike RADIUS, TACASC+ uses TCP port 49 by default and separates AAA into various parts (Meyers, 2018, p.373).

References

Meyers, M. (2018b). CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007) by Mike Meyers, McGraw-Hill Education. McGraw-Hill Education.

 

 

Sunday, January 23, 2022

Week 6 Posting - Genesis Perez

 Name Resolution or Name Revolution?

When it comes to DNS and name resolutions, I come across the analogy of a contact list on my phone or any cellular devices. I may not know the phone number by heart, but I organize my list by assigning their names to that number. This analogy applies to assigning an IP address to a specific domain name. Name resolution (or domain resolution) is the process of translating a domain name to an IP address for the purpose of service on the internet (Pramatarov, 2021). In other words, it is similar when a user types on the browser (www.google.com) and it will convert that domain name into an IP address.    

Domain Name System translates a domain name into an IP address of the users’ choice. It helps connect to search engines with no requirement to type the actual IP addresses. The benefits of using DNS are internet dependency, security, internet speed, and stability, whereas the problems regarding DNS are server breakdown, DNS cyber-attacks, and troubleshooting (Roomi, 2020)

References

Pramatarov, M. (2022, January 19). What is domain name resolution? ClouDNS Blog. https://www.cloudns.net/blog/domain-name-resolution/

Roomi, M. (2020, September 12). 5 Advantages and Disadvantages of Domain Name System. HitechWhizz. https://www.hitechwhizz.com/2020/09/5-advantages-and-disadvantages-drawbacks-benefits-of-dns.html

 

Week 6 Posting - Genesis Perez

 NTFS and Share Permissions

NTFS (New Technology File System) and share permissions are a crucial components to the network or Windows sharing process. These two types perform the same assignment which is assigning specific users' authorization to certain files and data. They allow and manage access to folders shared over a network (Netwrix, 2018). Admins assigns several users the ability to access these files or data. When it comes to NTFS permissions, they are used to manage access to data stored in NTFS file systems. The basic types of access permissions are full control, modify, read&execute, read, and write (Lifewire, 2021). The full control permission type grants users most responsibilities in the files and directories, whether the responsibility consists of adding, modifying, moving, deleting, and copying files. On top of that, they have the ability to change permission changes to those files. The modify permission type grants users modification on files and their properties, whether it includes adding or deleting files from a certain location. The read-and-execute permission type allows users to run specific, executable files which includes scripts. This type is limited and is not able to modify files. The read permission type only allows users to read and view files, whereas the write permission type allows users to write to a file or add them to a directory (dnsstuff, 2020). Although NTFS permissions are set to “allow” or “deny” access to NTFS files, the general share permissions are set the same but to shared folders and drives. There are only three types of share permissions: full control, change, and read. (Netwrix, 2018). Admins are in control of the full control permission type which grants users authorization to everything in the “read” and “write” permissions. In addition, they can convert permissions to NTFS files. The change permission type grants users all permissions that are included with “read” and able to add, change, and delete files and folders. Lastly, the read permission type can only view file names and data within those files and run limited programs.

 

References

 

Dnsstuff (2020, July 10). NTFS vs. Share Permissions: What’s the Difference? - DNSstuff. Software Reviews, Opinions, and Tips - DNSstuff. https://www.dnsstuff.com/ntfs-vs-share-permissions 

Netwrix Blog, Insights for Cybersecurity and IT Pros. (2018, May 3). Differences Between Share and NTFS Permissions. https://blog.netwrix.com/2018/05/03/differences-between-share-and-ntfs-permissions/

What Does File Sharing Mean? How Do I Set Up a File Share? (2021, June 18). Lifewire. https://www.lifewire.com/file-sharing-on-computer-networks-817371

Sunday, January 16, 2022

Week 5 Posting - Genesis Perez

 Times Up

For this week's discussion, I was assigned to find five companies of my choice and issue the WHOIS and Trace-route commands on each one of them. It is one of the few times I have used the command prompt for an assignment, and I find it very fascinating. The trace-route provided information like the IP addresses and RTT (Round Trip Time) on different columns. During my research, I came across a "request timed out" messages on a few of the hops. At first glance, I thought it was a security or privacy reason. But after a few side research sessions, I realized that it is not that bad at all. The message is not necessarily negative but there are a few reasons to why I have received it: the website’s security system or other security device is blocking my request, there was a problem with the return path or there is a problem with the general connection. After my research, I brought it up in my discussion post and I have received useful information and thoughts regarding the Request Timed Out message. 








References

https://www.xfinity.com/support/articles/run-traceroute-command?view=app

Week 5 Posting - Genesis Perez

 Optical Drive

The classic PATA or parallel ATA drives consist of the master-slave system. The master device’s role is to process and control other devices or drives in the motherboard. It will be the first to appear and operate in the BIOS or operating system (I., 2011). The slave devices' role is to be controlled by another device, which would be the master drive. It’s important to have this system since one device store the operating system and other features whereas the other would be its “backup” and extra storage base. In modern computers, optical drives are slowly becoming uncommon since everything is moving towards digital availability. This is an example of the only time optical drives are unnecessary to be installed in some cases. If a certain software can be installed digitally, then there is no use for an optical drive. For recreational or entertainment purposes, if a user is unable to find a digital copy of a specific movie on the internet, a CD / DVD drive can be useful for that user to insert and play that movie.  

Before installing the optical drive, it is crucial to have a 5.25” drive bay in your computer case since this will be where the drive will be installed in.  Another component required for installation is screwdrivers which will hold and stabilize the drive in the motherboard. Lastly, a data cable and power cable connected to. The first step is to locate the drive bay. Some drive bays have covers to protect the motherboard from dust and debris. In scenario when the case is screwed in, it is best to unscrew it first before proceeding. The next step is to mount the drive in the drive bay. If the drive refuses to fit, it is best to manually remove the front panel and mount it while it’s detached from the case. Once mounted, line up the holes from the optical drive and screw them tightly to the drive bay. The final steps include connecting the optical drive to the motherboard by using the SATA data and power cables. The SATA data cable is plugged into the back of the drive and into a SATA port in the motherboard (Larner, 2020). The SATA power cable connects to the power supply and to the back of the optical drive. To make it organized and minimize chaos regarding the wires and cables in the motherboard, it is suggested to use the cable management hole at the back of the case.


References

Larner, S. (2020, November 22). 5 Steps to Install a Optical Drive in a PC (CD/DVD or Blu-ray). How To Build Gaming Computers. https://www.build-gaming-computers.com/how-to-install-optical-drive.html 

I. (2011, June 22). Difference Between Master and Slave. Compare the Difference Between Similar Terms. https://www.differencebetween.com/difference-between-master-and-vs-slave/

 

Sunday, January 9, 2022

Week 4 Posting - Genesis Perez

 Get Paid with RAID

    Raid stands for Redundant Array of Independent (or Inexpensive) Disks. This is a method that combines multiple disk drives into a single unit for data storage and fault-tolerance. Array means two or more drives working as a unit. In addition to that, RAID's main purpose is to ensure data redundancy and improved performance. There are three types of RAID; mirroring, striping, and disk duplexing. Mirroring is the process of using two drives top hold the same data, which is good for safety; if one drive fails, the other drive will continue to run the data. However, just because it's safe, doesn't mean it's fast. Striping is making two drives act as one drive by spreading data across them, which is useful when it comes to speed. However, if one of the drive fails, all the data from both drives are lost. This method is not recommended for sensitive data or important projects . It is not worth risking for speed. Lastly, disk duplex is considered to be the fastest and safest since one controller does not write each piece of data twice. Each drive are on separate controllers and the system will continue to operate even if the primary drive's controller stops working. Through these methods, RAID implementations between software and hardware should be considered. Software RAID functions with the operating system of the machine. It can use regular SATA controllers to make a software RAID array. One of the few disadvantages is that it tends to overwork the OS, causing slow processing. The other implementation is hardware RAID. It functions with the physical controller or card, which handles are the RAID features. It relies more on speed and data redundancy. Out of the two, hardware RAID is the most expensive but offers better reliability.

Week 4 Posting - Genesis Perez

 Enter the Domain

Imagine being hired as an IT Administrator to a new and rising company with limited resources and fewer staff. The general manager hands you an assignment to operate the computer networking system for the company. Two networking methods come to mind: workgroup and domain. Each network has its advantages and disadvantages in certain situations or specific types of company. One of the main differences between the two networks solely depends on the management and operations with the computers, components, and resources within the network (Syndeocomm, 2015). Workgroup is related to the Local Area Network (LAN) network due to its limitation to smaller working areas like an office, school, and home. Domain networking works around a server called domain controller, which helps authenticate users and grants them permission to access resources like computers, printers, and fax machines (Lithmee, B. June 6, 2019). 

Domain networking consists of a group of computers and shares all resources, access control, and receive data from a separate server called the domain controller (Syndeocomm, 2015). Unlike workgroup networking, a group of workers called network administrators are in charge of controlling all computers in the domain by using servers. For example, you can have access to another computer on that network, making it more flexible. In other words, domain networking is known for its high level of centralized management which is recommended for bigger companies that rely on securing data and consist of a greater amount of control.

 

References

Lithmee, B. (2019, June 6). What is the Difference Between Active Directory and Domain Controller. Pediaa.Com. https://pediaa.com/what-is-the-difference-between-active-directory-and-domain-controller/#Domain%20Controller 

Lithmee, B. (2019, June 9). What is the Difference Between Domain and Workgroup. Pediaa.Com. https://pediaa.com/what-is-the-difference-between-domain-and-workgroup/ 

Meyers, M. (2018). CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007) by Mike Meyers, McGraw-Hill Education. McGraw-Hill Education. 

Should Your Business Use a Workgroup or Domain? | SyndeoComm. (2015). Syndeo Communications. http://www.syndeocomm.com/san-diego-it-support/workgroup-vs-domain/ 

Techopedia. (2014, August 2). Workgroup. Techopedia.Com. https://www.techopedia.com/definition/10075/workgroup

 

Week 10 Posting - Cloud Automation

For the final week of class, we learned about cloud automation and using common terminology that are used in automation services and techniq...