Saturday, March 5, 2022

Week 12 Posting - Genesis Perez

 Threats to the Computer

No one likes viruses. Everyone wants to keep their files and privacy intact and not on the risk of being exposed or destroyed. Back in the days when I wasn’t familiar with security programs and software, there were times where I’d encounter a virus and it would either slow down my computer or corrupt my files. However, after reading an article from Vangie Beal called “Computer Virus vs Worm vs Trojan Horse,” it changed my perspective on the different types of threats to an individual’s device. At first, I thought a worm or trojan horse was related to a virus but they’re simply not. It’s a common mistake today and there should be more of an awareness and differentiating the three threats. What is common knowledge is that these three damages and corrupts the computer in different angles.

A computer virus hangs onto a file or program and spreads itself to another, infecting computer to an extend unless treating it quickly. This may come in a form of emails and visiting NSFW websites. A worm is like a virus, but it spreads and travel without the user interacting with the device at all. Matter of fact, it sends copies or replicate of itself to the user’s entire network. A worm will consume a lot of bandwidth in a web server that it will stop responding. Lastly, a trojan horse is like a fake software that from the outside, it looks harmless, but once installed, it can either annoy the user by changing the users’ desktop interface or even deleting files off their system. Out of the three threats, the trojan horse is the trickiest and the most deceptive threat for the user’s device.

            According to Beal, a few useful tips are keeping the user’s operating system updated and to utilize a firewall (Beal, V., 2004).

References

Beal, V. (2004, October 28). Computer Virus Vs Worm Vs Trojan Horse. Webopedia. https://www.webopedia.com/insights/virus-vs-worm-trojan/

  • What did you find enjoyable or not about this assignment?
    • What I don’t find enjoyable is that I should’ve learned the differences between the threats in middle school or something. I feel like this is like beyond basic information that sadly, only know I learned this. I am not upset but it’s kind of funny.
  • Was it helpful to you in your current job?
    • It will be very helpful for me.
  • Can you see yourself Blogging in the future when it isn't required for an assignment?
    • I enjoy sharing ideas and personal experiences with topics that I admire and that I find interesting. Whether it’s gaming or technology, I will find time to blog in the future.
  • Can you see this ability as desirable for a company, giving you more weapons in your arsenal and making you a more attractive hire?
    • Cyber security is an important and useful career. I believe any company would love to hire a cyber security professional to keep their company safe and running smoothly.

 

Week 12 Posting - Genesis Perez

 Monitoring Traffic

No one wants accidents to happen on the road neither do reckless drivers risk other people’s lives in danger. It is helpful to have a guide or officer operating traffic and telling which driver their turn to go and stop. This same concept is very similar to interface monitors and their purpose in the networking system. According to Mike Meyers CompTIA Network+ Certification guidebook, “interface monitors track the bandwidth and utilization of one or more interfaces on one or more devices (Meyers, M., 2018, p.708).

The metrics that Meyers mentioned in his book were around bandwidth, utilization, packet drops, error rate, discards, and interface resets ((Meyers, M., 2018, pp.708-709). These monitors are effective for scouting for issues and sustaining smooth traffic flow and productivity. A benefit I want to point out is the in-depth report it hands out to the sysadmin or network operator that’s operating the network. It’s convenient and user-friendly to have visual presentation like graphs, parameters, and gauges to help user to indicate how it’s doing and if there are a setback hindering productivity.

 

References

 

 

Meyers, M. (2018a). CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007) by Mike Meyers, McGraw-Hill Education. McGraw-Hill Education.

  • What did you find enjoyable or not about this assignment?
    • I really enjoy researching more in-depth concepts and details regarding the purpose and operations of the interface monitors. For example, www.manageengine.com has a network interface monitor tool that can be effective in multiple scenarios.
  • Was it helpful to you in your current job?
    • Learning about the metrics and purpose of interface monitoring will enhance and improve my performance in future IT jobs. As of right now, it is irrelevant since I’m working in a warehouse as a equipment operator storing freight but in the future, I claim this study to be helpful.
  • Can you see yourself Blogging in the future when it isn't required for an assignment?
    • I enjoy sharing ideas and personal experiences with topics that I admire and that I find interesting. Whether it’s gaming or technology, I will find time to blog in the future.
  • Can you see this ability as desirable for a company, giving you more weapons in your arsenal and making you a more attractive hire?
    • I can absolutely see this study regarding the interface monitoring tool highly affective and will help me on my journey to be an IT professional.

 

Week 10 Posting - Cloud Automation

For the final week of class, we learned about cloud automation and using common terminology that are used in automation services and techniq...