Wednesday, February 26, 2020

The importance of speaking and writing proper English in your field on Essay

The importance of speaking and writing proper English in your field on study - Essay Example The field of study of network administration requires expertise in reading and writing English as a network administrator needs to deal with wide ranges of people, and in this globalized arena, an administrator had to speak with people from diverse areas and countries. English is the most common language. And hence English is very important in this field. Without proper communication a network administrator can not deliver his/her job appropriately. (Hunt, 2002). A network is a system where a chain of computers are linked with each other so as to transfer data electronically. Not only computers and communication devices, a network with the help of advanced architecture, helps to connect varied type of equipments in order to communicate information in the most convenient way. OSI whose full form is ISO Open Systems Interconnection and SNA whose full form is IBM’s Systems Network Architecture, are the popular architectures known. (Shelly and Rosenblatt, 2009; Steve, 2001 ). Ther e are two network types, one is LAN which is called Local Area Networks and another is Wide Area Networks. LAN basically connect two or more computers, printers and file servers within a limited area such as in office area, or in a college or school by means of cable and wires , which enable the computer system to have an access on a common set of files. Users with the help of LAN operating system can communicate with each other and share printers and storage equipments and can also access the centrally located processors. LAN can act as transfer points if two similar architectures are linked by bridges. Data can get converts across systems if LAN with different architectures are linked through gateways.(Shelly and Rosenblatt, 2009; Steve, 2001 ). Wide Area Networks help to link small networks and computers to large networks over a wide geographical area which includes different continent also. The network is connected through fibres, satellites or else a device commonly used called modem. Internet is such a Wide Area Network which connect users world wide through a collection of networks and gateways. (Shelly and Rosenblatt, 2009; Steve, 2001 ). The roles and responsibilities of a network administrator vary from one organization to the other but the common activity is assignment of network address, routine protocols, and routine table configuration. All these require in depth knowledge. The main objective of a network administrator is to maintain a proper computer hardware and network infrastructure within an IT organization. The main duty of a network administrator is to install new softwares in order to upgrade and update the networks timely, installing a standardized operating system and application in order to maintain the disk images for new computer installs, purchasing new hardware in order to meet the standard requirements, keeping a track of the license expiry dates so as to update the softwares in regular intervals. One of the most important respons ibility of a network administrator is to maintain standards for server installation and application. Besides all these, keeping a proper eye on the performance of the network system, keeping a track of security breaches, preventing poor data management practices are some of the roles of a network administrator. Most organizations put some of the responsibilities

Monday, February 10, 2020

Journal Essay Example | Topics and Well Written Essays - 750 words - 1

Journal - Essay Example The crime involved an internet fraud ring used to infect millions of computers internationally. Six Estonian nationals who used a virus called DNSChanger to infect millions of computers and manipulate computers without the awareness of the computer owners committed the crime. The criminals manipulated websites dealing with advertisements and managed to obtain more than $14 million. Additionally, the infected computers were prone to infection by other types of malicious malware (FBI, 2011). I found the story interesting due to the manner in which the criminals used the malware to manipulate advertisement websites. Additionally, the crime was widespread since it affected over 4 million computers. The cyber thieves used the malware to redirect users requesting to purchase objects online to a website they had developed. This depicts the sophisticated nature of cybercrimes. The website purported to sell similar goods. Additionally, the malicious DNS altered searches by users and endorsed fake products. People would thus purchase goods unknowingly but would never get the deliveries. The case depicted how the levels of cybercrimes have increased. Additionally, the case validates the need for protection of advertisement websites. To resolve the issue the FBI investigators had to replace the DNS servers with legitimate servers. The crime also demonstrated the increased usage of computer forensics in dealing with crimes. The fraud led to development of DNSChanger virus scan and removal software that can be used to disinfect computers that had been shut from internet connection (FBI, 2011). Operation Phish Phry Operation Phish Phry is another example of a cyber-fraud committed in 2009 by group of about 100 cyber criminals. The fraud targeted banks in U.S. and was investigated by United States Federal Bureau of Investigation (FBI) in conjunction with Egyptian authorities and Los Angeles Electronic Crimes Task Force. The cyber thieves used email fraud to obtain sensitive in formation such as usernames, passwords, and other financial information from users. They would send emails that appeared official to the victims asking them to submit their bank account details. On entering the details, the user’s information would be directed to an untrusted websites without their knowledge where they give their information that would accessible to the tricksters. The frauds would then use the information to transfer funds from the user’s bank accounts to bogus accounts. About $1.5 million was stolen (Federal Bureau of Investigations , 2009). The crime interested me since it demonstrated how competition in development of software has led to increase in cybercrimes. Additionally, the crime was recognized as the cyber-crime with the highest number of defendants in the computer crime history. The crime involved competition between law enforcers and the criminals. Additionally, the crime demonstrated the increasing misuse of technological advances in crim e enhancement. The cybercrime was conducted by criminal operation within United States and their counterparts were in Egypt. This depicts the extent to which cybercrimes have become complicated. Unlike other crimes that are often conducted by people operating within same locality, cybercrimes can involve people located anywhere across the globe. This case depicts the need for law enforcers to advance their computer forensic technologies to be able to