Thursday, July 8, 2010

The nineth day of our tour, 06/07/2010

It is another beautifully day, wake up with energy to do things and continue with what we discussed yesterday. We start of brainstorming about possibility at TPSC and hopefully we will take TPSC somewhere if we get to implement these ideas.

Speaking of availability from previous day, availability is about making sure that data and software needed are accessible and are in bear the originality. Availability could be of data/information and application, these things has to be made available as  they are driving engine of any organization. So as to make sure you have a required level of right and genuine data and software, three things has to be ensured, Confidentiality, Integrity and Availability of data and software.

In oder to have a maximum availability, we needs to know what factors lead to someone to be able to compromise either software or data, these things includes Motive, Opportunity and Willingness to compromise. If all of these three are in and owned by someone then that someone is a threat to an institution and appropriate measures needs to be taken in oder for systems and data to be secured and available all the time.

Who are people that likes to compromise data or software? This has been a question to most of the people and the answer could fall into the one or all the following, Fun hackersCompetitors and Anyone who think by doing that he/she will have a certain chance having a Financial advantage.

After knowing all these then it is possible for a person to know which are the best ways to protect his/her data and software provided that he/she has necessary tools. For example, taking a simple consideration of our own computers (PC), in oder to make sure your data and softwares are not compromised you must make sure that your operating system is not compromised and this could be made possible by installing all possible and released parches, there after install and update an antivirus and above all beware of site the visit and mails they download and any removable storage device that gets access to your computer.

After having discussion about all that we came to design and implement a small network by configuring switches, we created Virtual Private Network (VLAN) and made them communicate to each other, it was a challenging exercise but we managed and at last manage to make computer communicate using the VLAN we created.

This was one of of the very pleasing and challenging day, we learned a lot in this day.

The evening time was one of the finest evening I had never had, we take a trip to the nearest town to watch a football match, the whole staff at SAMOffice wore similar T Shirts ready to witness the semi final match between Netherlands and Uruguay, one of the finest match. We really enjoyed ourselves very much that evening..  

No comments:

Post a Comment