Recent orders

computer networking

Name:

Due date:

Topic: computer networking

A global catalogue is a distributed data depot that contains searchable object that is partially represented in every domain in a Multidomain Active Directory Domain Service. It is stored on domain controllers that have been selected as global catalogue servers and is distributed in multi-master replication. Some of the benefits that we acquire from the global catalogue are that we can locate objects without having to identify the domain name and also is a domain controller.

Fault tolerance is the ability of a system to continue working even if its hardware fails. This is achieved when multiple vital components are present in the same computer system such as the CPUs, memories, power supplies. In such a way that when one component fails the other takes over. A team of computers can benefit if there is as sub team. In fault tolerance there is the presence of a similar component that can act in place of the other in the case of a failure. It allows the recovery of any account settings that might have been lost .e.g. when memory fails. If there was back up memory storage the information to set up the original account is recovered. Having dual operating system also enables security to the account.

A server core is a minimal option installation that is done while deploying standard, Enterprise and data-centre windows server 2008. It provides partial installation of windows server 2008 that allows several sever roles. Unlike any other operating system sever core does not have the desktop options such as the taskbar, start up menu and other features that one may be used to seeing, instead it has a command prompt interface that shows the user most of his/her time will be spent carrying out configurations and entering commands. One of the main purposes of the server core is the securing of branch offices. It does so because of the various attributes it has, which includes the Read Only Domain Controllers. Another attribute is its updated version when installed provides minimal environment for running specific supported server roles such as the DC role.

Windows server password is usually stored in the Active Directory called AD password setting container located in the system container of the AD domain naming setting. How to configure a new password: the first step is through creating a new AD object of the msDS password setting object class container. Objects that belong to this class are referred to as PSO (password setting objects). Only members of the domain administration group can create the password since they are the only ones with the permission. To apply the object created one requires to link PSO to msDS and to do so one requires permission from the administrator. The msDS password d=settings allow the configuration of an integer password which in our case will be a 10 character log on password. In the case of a multi-PSO this kind of password with a low value count is usually given higher priority over others.

To configure the number of attempts that a user will enter the password one requires opening the group management console. Once you open the management group, expand the list of options on the left side of your window, domains, your domain, group policy objects, and find default domain controllers policy and choose the edit option. Scroll down through your computer configuration options, Policies, windows settings and security settings and click Account policies. In the right pane of your window several options do appear the password policy, Account lockout policy that we require and the Kerberos policy. By clicking any of the options one is able to edit each of the policies as required, to change the lockout to be three attempts we click on to the account lockout policy and there we can change the number of attempts to be three. This gives the person logging in to the domain account three attempts to enter the password. The first step to configuring the volume if a domain account is the installation of File System Resource Manage; this is installation id enabled through the use of manage your server to add the file server role to your machine. Once the FRSM is installed right click on the root node and select connect to another computer then select the quota management node. The next step is to right click the Quota node and select create Quota. Browse to select the folder and select monitor 500MB. To select the limit lower limit to which a default warning level is achieved set the percentage limit to which a file size should be which in our case is 450MB. This is done in the same quota management window.

Active Directory certificate services is windows 2008 server role, referred to as certificate services in previous windows version, it provides the services of producing a production key infrastructure which will be discussed in the next question. The key allows administrators to manage public key certificates. ADCS an implementation of Microsoft that secures transfer information and identify management and verification

Public Key Infrastructure is a security design that provides protection of files and data in the internet. It supports secure transfer and exchange of information between members in the internet. However it can also be used the simple setting of a private network. How are they used? There are three ways they are used in both the private and internet settings; they can be used for signature, encryption and decryption.

To create a new user account we first log on server 2008 R2 domain controller with administrator account. On the desktop screen click start then go to the administrative tools, the click the Administrative Directory Users and Computers. On the active directory users and computers on the left pane expand the tree go down the list of options and choose users. Click on users and scroll down and choose new> user. A new window (new object-user) pops up. Next type the domain name .e.g. DomAdmin then after typing the name type the date to which the account will expire 30th September2013.When you are through click next, the next box appears and type and retype the password then check and uncheck the check boxes as required. Click next button then the finish box to create a new account.

Steps to installing the Certificate Authority; open the server manager, select roles then add roles in the centre pane. In the select server roles window select the Active Directory Certificate Services by placing a check mark next to it and click next. In the next step an introduction to ADCS is provided and points to note after the installation of CA >next select role services which in our case we choose the Certification Authority >next. On the specify setup type click Enterprise. On the next step, click root CA on the specify ca type. Next we create a new private key on the setup private keys> next, on the Configure Cryptography page select the default cryptographic service provider key length and hash algorithm> next, on the Configure name choose a unique CA name >next, the next step is Set the Validity Period, set the Validity period to be 2 years>next, on the Configure Certificate Database, accept the default locations >next, to finalize on, the Confirm Configuration Options page check through all settings selected; if all of them are okay click install.

Data forms a critical asset used not only in businesses today but also in other day-to-day applications

Databases

Presented by

Institution

Introduction

Data forms a critical asset used not only in businesses today but also in other day-to-day applications. People use and collect data almost everywhere as they aim at determining some characteristic behaviors of some things, objects, or people. Technologists have come up with sophisticated equipments capable of storing date in a highly secure system referred to as a database. By definition, a database is a depository of data designed specifically to support well-organized data storage, retrieval, and maintenance. A database (or databases if they are more than one) specializes in storing binary files, images, documents, relational data, video, transactions, analysis, or geographical data depending on the purpose of the data (Ricardo, 2012). With the following idea in mind, the following discussion provides an explanation of databases in terms of database types, storage, relational mapping, database management systems, programs relational abilities, working parts, database language, and Structured Query Language (SQL).

Discussion

Types of databases

Databases come in different types each type suited for its own purpose. These are:

Document-oriented database

This is a computer program used purposely for storing, retrieving, and managing data stored in a database. The main type of information managed by this type is document-oriented or semi structured data. Good examples of document-oriented database are the Couch DB and Mongo DB. The types of encoding used to store document-oriented data include ZML, JSON, BSON, and binary forms such as PDF and Microsoft office documents (Word, Excel, MS, and others). A database addresses documents using a special key representing a specific document. This key can retrieve a specific document from the database. A representation of the above type is shown in figure 1 below.

Figure 1: An example of a document-oriented data type

Embedded database

This type consists of data developed by individual end-users. Some good examples of embedded database are presentations, collections of documents, multimedia, and spreadsheets. An embedded database forms a broad technology category consisting of database with varying application programming interfaces, database architectures, storage modes, and target markets. Figure 2 shows a representation of an embedded database if form of a spreadsheet.

Figure 2: An example of an embedded database

Graph database

These are SQL databases that use graph structures with edges, nodes and properties that represent and store information. This type of database provides index-free adjacency meaning, every element of data has a direct pointer to its adjacent elements with no need of index lookups. Figure 3 below shows an example of a graph database.

Figure 3: A graph database

Hypertext database

These are databases particularly used to manage large amounts of contrasting information. For instance, they assist in maintaining online encyclopedia.

Operational database

An operational database consists of system-specific reference data and event data that belongs to a transaction-update system. It also contains some system control data such as flags, counters, and indicators. It forms the source of data for data warehouse containing detailed data used in the day-to-day operations of an organization. The data changes with the continued update of information reflecting current value of the previous transaction.

Figure 4: An example of an operational database

Distributed database

In a distributed database, no storage devises are attached to a common processing unit, as the C.P.U. Data may be stored in multiple computers located in a similar physical location, or dispersed over a network of interconnected computers. Al systems in a distributed database are under a central management system where collection of data is distributed over various physical locations. An example of a distributed database is network servers on the internet, corporate intranets, or extranets. The distribution of databases to different locations improves the performance of end-users. Replication and duplication processes ensure distributive data are up to date in a database warehouse.

Storage

Databases are applicable in almost every human activity in the world today. People use databases when surfing the internet, accessing medical information, talking to friends through dialing phone numbers, and even while shopping. Each of the described database types above has records that describe part of a reality. Sometimes individuals or organizations lack access to important data because of failure or exhausted resources leading to a tremendous financial losses. In order to ensure effective and efficient accessibility of any database, system administrators must be cautious enough to ensure every database is kept in an accessible store (Vengurlekar & Bagal, 2013).

Databases are stored in a set of compatible hardware and software. In any database storage, compatibility is an essential and must be carefully tested to prevent cases of data corruption. Some organizations have huge loads of data and in such circumstances, redundancy of susceptible materials must be provided. Any database storage system must meet the expected standards in terms of reliability and performance to allow fast and continuous access to required data at any time (Vengurlekar & Bagal, 2013).

Hardware

Hardware used in database storage implementations has high requirements. In order to ensure uninterrupted working conditions require high performing and reliability hardware systems. The basic requirements for database storage hardware are listed below:

High performing CPUs properly with double processors

Ensure high data safety and performance (H/W RAID controller used)

High speed drivers for fast data access and reliability

High speed network connectivity

A large amount of memory

Storage software:

Software used in a database store must have maximum utilization of the hardware capabilities. Moreover, software must allow uninterrupted access to data, efficient recovery, and good backup process. Below are some of the essential requirements of good database software.

Ability to enhance interface throughput with link aggregation support

Built-in SNMP based monitoring system and notification for system monitoring

Controllers to ensure high performances and data security

Rational mapping (Relational abilities)

Object-oriented programming language and a relational database are the most common tools used in the development of enterprise applications. Java is the most widely used object-oriented style today. All computer applications must load data from a database, come up with an object to represent the data in main memory, perform computations involving the object and store changes in the database warehouse. Generally, relational mapping are frameworks used in storing and retrieving persistent objects. Their main aim is to support complicated activities and manage connections between relational databases and objects. The relational database mapping programming technique is typically utilized through an Application Program Interface (API) (Devarakonda, 2001). Some of the most popular APIs integrated with the relational mapping are:

Hibernate-most used java implementation

Django-a python framework with an inbuilt (Object Relational Database Mapping (ORDM) support

Core Data- Cocoa framework that comes with iPhoneOS and Mac OSX

ORMlite-a java implementation that has a support system for Android

Advantages of relational mapping

It gives developers a better chance to convert data from rich data types used in object orientated programming languages in order to minimize relational database types

Uses are in a better position to use self defined ADTs in database storage

It maintains continuity in databases shared between applications. For instance, instead of a developer storing “address” as a VARCHAR, it can be stored as an ADT address with a unique format. All applications are now capable of using similar address class ensuring continuity.

Limitations of relational mapping

There is a lowered efficiency for large scale applications with the use of complex ADTs

Database size might increase depending on the size of methods stored

A lot of large applications containing frequent database read/write activity never gain from ORMD

It is more useful for mobile phone databases and small applications, but not in computers

Database management system (DBMS)

DBMS is highly complex software used in the storage of information in a computer, and assists in managing and controlling access to databases. The DBMS has logically shared collections designed to meet information needs of an organization. The first DBMS was designed in 1960s. Before this period, data management was done using file based methods that stored data in individual data files that had interface between programs and files. The modern DBMS is technologically advanced that allow users to add, update, and delete data. It also has its own processing engine that allows users to write queries for easier analysis and processing of data (Shelly & Rosenblatt, 2008). The DBMS system consists of three major components as described below:

Physical Data Repository

The physical data repository forms the physical location where the system stores data. Data can be stored in a central location, or distributed across various locations as in the distributed data used in enterprise wide applications. For disaster recovery and data requiring 24 hours surveillance, multiple locations with duplicated locations are essential. In addition, the physical data repository has standards and drivers such as ODBC and JDBC that allow easier access to information stored in a database warehouse and is compatible to all DBMS (Gillenson, 2012).

Data Manipulation Language (DML)

In any database management system, the system must provide a language that enables users to keep the data in terms of updating, adding, and deleting. This is the type of language called Data Manipulation Language. DMLs are executed of tables, columns, and schemas (Gillenson, 2012).

User Interface

DBMS has a query language that allows a user to access the stored information. These languages occur in form of Query By Example (QBE0 or Structured Query Language (SQL). DBMS provides web-based user interfaces that allow the user an easier access to information stored in the system via the web (Gillenson, 2012).

Even with the complexity nature of DBMS, it has the following advantages. Firstly, the system is relational thus easier to add, delete and update information without affecting the overall framework of the database system. This makes it more flexible than the traditional file system. Secondly, DMS offers better utilization and hardware resources through providing inherent support for users. It allows easier storage and processing of information on high-tech computers whereby a client can easily access with the necessary authentication processes. Finally, DBMS promotes increased developer productivity and data independence. Under the DBMS, programmers never worry about any storage problem since the DBMS takes control of all techniques needed by a programmer (Hoven, 2012).

DBMS programs

A DBMS program is software used in managing data and information structure as records, fields, and files. The DBMS program forms the main driver of information systems and provides file creation, data entry, query, update, and reporting functions to a database. The above program allow a user create and edit individual files at the keyboard. Programming allows automatic update of data from one file into another (Kerrisk, 2010).

Database language

Every database must have an appropriate language and interface for each category of users for easier expression of database queries and updates. Database languages help in creation and maintenance of database on computers. Some examples of database languages include Oracle, MS Access, MySQL, FoxPro, dBase and many more.

Data definition language (DDL)

This language allows a user to define data and their relationship to other data types. Its work is mainly to create files, data dictionary, databases, and tables within databases.

Data Manipulation Language (DML)

This language provides a set of operations that support the basic data manipulation operations on data stored in databases. A user can insert, delete, update, or retrieve data from the database using the commands of DML language.

Data control language (DCL)

The following database language control access to data and database using statements like REVOKE and GRANT. A user is granted privilege with the assistance of a GRANT statement. The assigned privileges are either ALTER, SELECT, EXECUTE, DELETE, INDEX, or INSERT.

Structured Query Language (SQL) and its relation to its application

SQL is a high-class language used by database programmers to assist users manipulates relational data. One of the main advantages of SQL is its ability to allow users to specify the information they want and the program retrieves all the data required. SQL works at various levels allowing users to retrieve rows in one or more tables. SQL has three categories as discussed in the section above, DDL, DML, and DCL. Don Chamberlin and Ray Boyce from IBM Corporation developed SQL in 1970s. The original name for the language was Structured English Query Language (SEQUEL), but later changed to SQL and registered as a trademark in United Kingdom. SQL is the presently accepted language for relational databases. Different elements of databases are used in the implementation of SQL. The most important element is the data types. The basic data types include integer, float, decimal, char, time, date, and blob (Caffrey, 2011).

SQL relation to its application

SQL plays a significant role in the database management system. It forms the only language that programmers use to make users read and interpret data in a database. In addition, as discussed above, SQL supports various database languages such as DDL, DML, and DCL allowing users to easily locate, update, retrieve, and delete data from a database accordingly. Moreover, SQL offers a chance for future database experts to use their innovated languages because of its compatibility to changes (Date, 2011).

Conclusion

The world today is in form of a gigantic database because people are always involved in organization of data in order to maintain and improve the efficiency in day-to-day affairs. The following discussion has provided a full overview of databases, their use, applications, and their major components. From the discussion, a reader can easily know the type of database system to adopt depending on individual data types and size of data.

References

Beaulieu, A. (2009). Learning SQL (2nd ed.). Sebastopol: O’Reilly Media.Caffrey, M. (2011). Modeling and accessing relational data. Oracle Magazine. Retrieved April

20, 2014 from:

http://www.oracle.com/technetwork/issue-archive/2011/11-nov/o61sql-512018.html

Date, C. J. (2011). SQL and relational theory: How to write accurate SQL code. Sebastopol, CA: O’Reilly.

Devarakonda, R. (2001). Object-Relational Database Systems. The Road Ahead, Crossroads

Gillenson, M. L. (2012). Fundamentals of database management systems (2nd ed.). Hoboken, NJ: Wiley.Hoven, J. V. (2012). Database Management System and XML: Interchange of Data. Information Systems Management, 19(1), 94-96.Kerrisk, M. (2010). The Linux programming interface a Linux and UNIX system programming handbook. San Francisco: No Starch Press.Kulkarni, U. R., Ravindran, S. & Freeza, R. (2007). “A Knowledge Management Success

Model. Journal of Management Information Systems. Emerald Management Reviews. 23 (3)

Ricardo, C. M. (2012). Databases illuminated. Sudbury, MA: Jones & Bartlett Learning.)

Shelly, C. & Rosenblatt. (2008). Systems Analysis and Design, seventh edition. Thompson Course Technology.

Vengurlekar, N., & Bagal, P. (2013).Database cloud storage the essential guide to Oracle automatic storage management. New York: McGraw-Hill Education.

Computer laws and forensics

Computer laws and forensics

Student’s Name

Affiliation

Course

Date

Q1. Appear and behave professionally: Keep hands on the table for juror to view.This gives an open truthful and confidence appearance. Sit in an upright posture and look at the questioning attorney while answering questions. Telling the whole truth and nothing but the truth to compromise ones credibility. Having a thorough knowledge of the case helps the first responder to be more confident and persuasive. Making eye contact with juror while answering the questions asked and making the juror know you’re confident. Listening carefully and ensures understanding before responding (Maras, 2012).

The witness should memorize the statement before proceedings to find inconsistency. The responder might feel combative from cross examination, making a certain outburst without waiting for objection from his attorney. This makes the juror believe the witness might have been lying all along. The defense team might have trouble cross examining the witness as lack of knowledge on the case, the responder might feel agitated and lack consistency in answering the forwarded question. Witness might be vaguely informed on how to address the judge. During cross examination the responder might not be able to differentiate answers of leading, rapid and compound questions.

Q2.An expert collects tests and evaluates evidence forming an opinion to communicate to the judge and jury. An expert may be used either for consulting or testimony. The consulting expert acts as an employee in case of litigation or trial but does not stand trial, as opposed to testimonial expert. The experts are vetted on, skills, academic education, experience and professional training. Examples of some IT certifications are certified fraud examiners C.F.E: They are professionals who denote and indicate frauds and fraud risk.They combine knowledge of financial transactions with an understanding of methods and laws of how to solve allegations of fraud. CFEs analyze financial records to determine whether they have been manipulated (Maras, 2012). .CFEs is best suited in forensic accounting. Certified System Analyst: This is a profession I.T expert, with knowledge and experience in computer systems and corporate information technology. This is dependent on the case as per the court.

Most judges have in house experts who are under the judiciary payroll to increase reliability. An expert witness fee is paid as per arrear of expertise according to Expert witness fee guide. An expert charge more while testifying on trial and deposition. This will also range as per the experienced acquired over the years. Expert witness deposition requires advanced payment of 48% from opposing counsel. The median minimal charge for all experts was 3 hours for deposition and 4 hours for trial.

The Certified system analyst is an expert who defines an organizational I.T needs. He develops software and technology departments as well as showing departments on how to best use hardware and software. A Certified system analyst has a Certified Information Systems Security Professional (CISSP) Accreditation to increase valuation analyst, he has knowledge in developing and designing enterprise solutions by using Microsoft. The Certified Fraud examiner is issued by the Associating of certified fraud examiners. This is the world’s largest anti-fraud organization. The CFE is a professional course that requires constant education such as the Certified Public Accountant. They possess knowledge in all aspects of anti-fraud profession.

Evidence can be presented physically, intangible or direct, regardless of the evidence type its presentation in court is done through witness’s person testifying under oath. Such is the case for a Certified Fraud examiner whose understanding and knowledge on forensic accounting is critical in a case that is associated with fraud in financial transactions. According to Brad coopers case in April 9, 2013, Brad was found guilty in May 2011 for first degree murder. In their defense they had two witnesses who were revoked by the judge but due to career expertise qualified him to explain the data. This is an example of a case where expertise is what determines if one is a forensics examiner.

Q3. Children start learning the use of computers at very early stages of their life. Knowledge of computer will help one to converse with children on various harms on the internet. Strategically place the computer in a high traffic area such as the living room as it enables one to periodically check out what your child is doing. Make times and set rules for using the computer. Assessing and teaching children to be assertive protects them from internet predators when one is not are around. Employ proper software programs that filter the sites that are inappropriate.

By Educating parents on the dangers of internet access at early age gives one an open mind to read on the cybercrimes and be a step ahead of the cyber terrorists. Use a fire wall: They monitor traffic between computer and the internet and act as a wall of defense keeping away intruders. Securing wireless network: Hackers can have access to data of unsecured lines. Use of strong password helps to secure information. It is advisable to encrypt passwords so as to set up for people with passwords. Using comprehensive security software updates the operating system and keeps the computer safe as well as assists in preventing and protecting the computer from malware, phishing and spyware.

Establishing ground rules for online use thus; Email access links are sent with spam and can spread a worm in your operating system. Some viruses replicate and spread through your computer thus one has to be cautious. When a child uses instant messaging one need to learn the lingos.Understanding that almost everything is written in code, this will make it easier for you to know what is going on in chat rooms. Also remember that webcams are the best tools for online sexual predators.

Q4. The use of identity fraud insurance protection and payment protection insurance enables clients to be covered in case of an identity theft or harassment from individual. It secures one with policies that enable implementation of fast tracking of the fraudsters. The use of Identity fraud ensures that credit balance is checked at all times, on accounts as well as transaction statements. The use of payment protection insurance is to cover the damages received after the incident of identity theft for a period of one year (Vacca, 2005).

Use of firewall and ant viruses: This are tools used to minimize online and identity theft on online data. To protect one against electronic identity theft by phishing or hacking, malware users are advised to maintain computer security by updating Operating systems, antivirus and web browser security.

Comparison and contrast are indicated below;

Identity Fraud Insurance protection Use of firewall and antiviruses

It ensures that after incident has occurred there is adequate cover It assist in prevention of fraudsters from accessing personal information

It is mainly long term as it is a policy that covers the whole year It Is long term depending on the frequency of updating the operating system and antivirus

It is relative expensive as compared to using firewalls and antivirus It is cheaper because it requires minimal maintenances

Antivirus automatically updates itself with the latest threat and, cures and repairs damaged content automatically when malware is encountered. It contains a real time scanner to intercept malware and scheduled scanner which automatically performs the scan. Some other features include: webmail protection, instant messaging protection, automatic virus and program update on demand scanner. The fire wall can be a software or hardware application device that acts as a buffer between your computer and the internet. They have features that configure certain types of information being transmitted in the internet.

Using identity fraud insurance protection covers the cost of salvaging the mess however; payment protection insurance caters for the damages caused. The accolades and awards received by various anti-virus firms show protection against cyber terrorist, and Identity fraud phishing as well as hacking. Example is McAfee was awarded best advanced persistent threat protection and is a SC Magazine award finalist as the best database security solution (Vacca, 2005).

Reference

Maras, H. (2012). Computer forensics: Cybercriminals, laws, and evidence. (p. 379 pages). United Kingdom: Jones & Bartlett Publishers.

Vacca, J. (2005).Computer forensics: Computer crime scene investigation, volume 1. (illustrated ed.). United States of America: Cengage Learning.