WEEK 13:Reflection on the course

What you have learned?

This course is RES701. Through this period of study. I think I can learn a lot from it. This course includes research on academically strong content. And the criticism of some issues in daily life is very important. Therefore, this course has very advanced research skills from all aspects like we show research. This is very meaningful to me.

Through this period of study. First of all, I have a deeper understanding of some academic words. For example, truth and ontology. I have never been exposed to this content before. Through this course, I can gain a deeper understanding of relevant content and knowledge. And, I have come into contact with a lot of academic or professional vocabulary. This is very helpful for my English improvement.

Second, research and literature on some academic categories. Through this course, I know how to find the right documentation correctly. And how to properly use the content of the article and the author’s point of view. This is very useful for my future research.

What you have enjoyed (or not!)?

In this course. I am interested in many academic literature, APA references, and how to find academic papers that are useful to you. Because these contents have helped me a lot in the future. If I need research on something or a field. I can master a lot of methods and the correct reference content. Therefore, this can help me quickly find research methods that are appropriate for the topic, thus reducing the time spent.

WEEK 12:Ethical Behaviour

  • About social values not laws
  • Treat others as you would wish to be treated
  • Evaluating how things affect others – particularly negatively
  • Respectful treatment – treated as an equal (human) being
  • Privacy protected/safe environment
  • Health and well being (and property) protected

You find some good images on the web that would look good on your site.  You copy and paste them to your blog.

I think this kind of behavior is related to morality. First of all, this website was created by others. Not something that belongs to you. When we need to learn from others, I think we need to inform the author to get the power to use. Or when we use it, indicate that this is something that references someone else.

You are in a hurry to finish an assignment and you find the perfect explanation of a difficult concept on wikipedia. You decide to copy it into your work.

Obviously, this kind of behavior is to copy other people’s works. When we use resources that are useful to others. We need to add a quote. And clearly indicate where these resources come from. We can refer to the content expressed by the resource. Explain through your own thinking. If it is just a simple copy. This means we steal the creativity of others.

You are a medical researcher and you think you have discovered a new drug that cures lung cancer.  It worked well on mice although a few of them died of heart problems. You want to test it on people.  You recruit 100 lung cancer patients into your treatment programme. You don’t tell them about the new drug.  You treat 50 patients with usual drugs and 50 with the new drug to see which is better.

This is obviously an immoral thing. First of all, you can’t ensure the safety of this drug. Some experiments work well on mice and do not necessarily harm the human body. Second, I think people who participate in the experiment need to know about the new drug. This is their right. They have the right to know. Therefore, if you can’t guarantee the safety of the drug. That is irresponsibility for the lives of others. Therefore, this behavior is very unethical.

You are doing your PhD about drug abuse among students.  You interview 30 students about their drug use. You discover that one of the students is actually a fairly big time dealer and you report him to the police.

I think this is a good example. First of all, when we encounter illegal crimes. We should bravely stand up and call the police. In addition, drug abuse can have a huge impact on society and people. For example, the abuse of drugs poses a great threat to the physical and social development of people. Therefore, I think that when we find someone who abuses drugs and trades. We should call the police immediately for help.

You are a researcher looking at the effect of violent computer games on children.  You recruit 20 children into your study. Over a month you regularly show them images of violence to see if it has an adverse effect on their behaviour.  One of the children becomes quite distressed each time and so you stop showing her images and drop her from the study.

I think this is a very unethical act. First of all, every child is in the stage of growth. If you turn them into the goal of studying violent computer games. They are very susceptible to interference from this information. There may be a tendency to violence in the future. We need to study these situations in other ways. There are indeed big problems with the use of children. However, when the researcher sees that the child is very depressed, the study is interrupted. This seems correct to me.

You want to research how easy it is to hack into your organisation’s computer system by persuading people to divulge login and password details.  You recruit a small team to ring up key people in the organisation and persuade them to give either their own or their boss’s details.

This behavior is clearly unethical. And this behavior is also illegal. It is a criminal act to divulge the information of others without the permission of others. In addition, the disclosure of the boss’s personal information may lead to the closure of the company or the theft of trade secrets. On the other hand, if someone else’s bank card password is compromised, the personal property of others may be seriously threatened.

You are doing an initial research in area of a town where may bars and pubs are located, to estimate the level of problematic social behaviour in the area. your research is independent from the police, because you want to observe their behaviour as well. You observe both abusive and violent behaviour.

I think this behavior and morality are not interrelated. First of all, this is to study the level of social behavior in the region. We observe them by studying some behaviors of some professions. This will not affect anyone else. Moreover, this is not an issue of illegality or crime. Therefore, I feel that this behavior and morality are not interrelated.

Assessment Two: WEEK 1

Emerging Technologies, Critical Comparative Study ITIL, Cobit5

This is the content of the second part of the NET701. I will use this blog to record a new type of technology.

Our team has 2 people. It is me and Yifeng. We will choose a research area and then compare the two architectures using ITIL and Cobit5. Therefore, I need to write a report on the blog to record and research.

①:What is emerging technology

Related image

Through Baidu Encyclopedia,A series of cutting-edge technologies in emerging technologies, technology convergence is its characteristics, the original different technologies gradually share resources to accomplish similar work. For example, voice, video technology and some data content interact. Thereby creating new and more efficient technologies.

Top Ten Emerging Technologies in 2019

1.Internet of Things
2: Artificial Intelligence Technology
3:5G
4: No server computing
5: Blockchain
6: Robot
7: Biometric technology.
8:3D printing technology
9: Virtual Reality (VR) / Augmented Reality (AR)
10: drone

Our team will use 5G as a field for researching emerging technologies.

Image result for 5G

The rise of 5G networks is improving the ability to move, manipulate and analyze data on our wireless platforms. As 5G will be widely used in the next few years. The era of the original 3G change 4G is still vivid.

The development of 5G will drive the development of complex applications, as well as solve problems and increase the growth of various industries. Developing a 5G-based solution provider for industry-specific applications has a first-mover advantage.

Image result for The development of 5G

②:What is ITIL and Cobit5?

They are all infrastructures that can be used to promote and advance high technology in the business world.

ITIL

ITIL is a repository of information technology infrastructure. It has great practices in enterprise IT service management and governance.

ITIL effectively combines useful resources with each other through scientific management and governance processes. Which contains the infrastructure. Maximize the benefits of IT services, monitor, evaluate, and improve

Cobit5

COBIT is the standard for process-oriented information systems auditing and evaluation developed by the ISACA (Information Systems Audit and Control Consortium)

COBIT is a guide based on the concept of enterprise IT governance and the implementation of IT governance. And auditing standards for the IT build process

COBIT 5 provides a comprehensive framework to support organizations in achieving their corporate IT governance and management goals

Image result for cobit 5

WEEK 11: Peer Review

I read the Zhengning’s (Paul)blog,I noticed that he is very interested in things in the VR field. And when we talk about virtual reality technology. We will associate with the existence of VR. When he first used VR, VR’s high technology made him shocked and surprised. The reason is that VR can immerse him in the virtual world. His use of VR in games, the cost of VR equipment, and the popularity of some VR technologies in education. Therefore, I think this technology is very advanced. I also look forward to Paul’s outstanding performance in this field in the future.

Paul said in his blog that he prefers to research VR technology. He wants to do some research to find out why virtual reality is worth developing. Therefore, I am looking forward to what kind of research results he can obtain in future research.

WEEK 8: Broad Research/Project Interest Area

1.Short description of the area of IT that interests you (explain it to me!)

The IT field I am interested in is artificial intelligence.

It is a new technical science that studies and develops theories, methods, techniques, and applications for simulating, extending, and extending human intelligence.

2. Why is it interesting to you

Artificial intelligence is a challenging science, and people who do this work must understand computer knowledge, psychology, and philosophy. Artificial intelligence is a very broad science that consists of different fields, such as machine learning, computer vision, etc. In general, one of the main goals of artificial intelligence research is to make machines capable of doing what is usually required by human intelligence. Complex work

3.Three things you know about it

Machine vision, fingerprint recognition, face recognition, retina recognition, iris recognition

4. Three things you believe about it

Psychology, computer science, information theory

5. Three things you don’t know about it

Brain simulation, symbol processing, subsymbol method

6. Would you rather: Do something, Research it or Do both

Do something

I am interested in artificial intelligence. I think there will be more artificial intelligence in the future that can replace people doing some basic boring and repetitive work. And we can take the time to research and do more meaningful work.

7.Go and see if you can find a few resources about it – (post URL) forum? facebook group? linkedin group? or a good blog? Or even academic articles 🙂

There is a blog relate to web design. It shares a lot of knowledge about how to set up a web and make it useful.

8. AND – APA reference them in your write-up.

APA-Reference :Russell, S. J., & Norvig, P. (2016). Artificial intelligence: a modern approach. Malaysia; Pearson Education Limited,.

点击以访问 CS503-2.pdf

Lab 16: Backup and Recovery

1. Summarise the backup and restore functions of Windows Server Backup you used in the lab.

Because Windows Server Backup is a feature in Windows Server 2012, it is very simple to install. By default, Windows Server Backup is not installed.

We can customize the data type of the backup storage according to our own needs. We can also put it in the specified location or on the drive. The goal is to store backups and provide greater security.

Before using Windows Server Backup local one-time backup, make sure that the local server or the computer on the LAN has enough disk space for backup, and the user who logs in to the computer must be a member of the Administrators group or the Backup Operators group to use. Windows Server Backup

2. Discuss the protection Windows Server Backup provides.

By default in this lab, Windows Server Backup does not provide password encryption for the contents of the backup. From the previous labs we can see that we can combine BitLocker together is the best choice. Can provide higher security.

Lab 15: Data Encryption

1. Summarise the functions of BitLocker you used in the lab (Just focus on BitLocker not GPO).

BitLocker Drive Encryption It is a new data protection feature in Windows Vista. Mainly used to solve a problem: data theft or malicious leakage caused by physical loss of computer equipment.

BitLocker uses TPM to help protect Windows operating system and user data and helps ensure that computers are not tampered with even if they are unattended, lost or stolen.

2. Discuss the protection BitLocker provides the user.

If the computer has a compatible TPM installed, BitLocker will use the TPM to lock the encryption key that protects the data. Therefore, these keys can only be accessed after the TPM has verified the state of the computer.

During the boot process, the TPM releases the key, which unlocks the encrypted partition only after comparing a hash value of the important operating system configuration value with a previously taken snapshot. This will verify the integrity of the Windows boot process. If the TPM detects that the Windows installation has been tampered with, the key will not be released.

For added security, the TPM can be combined with a user-entered PIN or a startup key stored on a USB flash drive.

3. Suggest how the Recovery Key should be stored securely. 

According to the first few questions described. A safer way to recover a secret key can be to use physical storage. Like USB.

The pure TPM mode requires a TPM chip in the system, so that the key used for decryption and the related files used to verify the integrity of the boot file are saved in the TPM chip.

The pure U disk mode requires the system to meet the conditions associated with the USB device mentioned above, so that the key used for decryption will be saved in the U disk.

Mixed mode, you can further enhance system security in the form of TPM+U disk, TPM+PIN, and TPM+U disk+PIN

Lab 14:Implementing DNSSEC

In this lab, DNSSEC provides a mechanism to verify the authenticity and integrity of response information, using cryptographic techniques to enable the domain name resolution server to verify the response it receives.

Through the deployment of DNSSEC, the identity authentication of the DNS domain name server can be enhanced, thereby helping to prevent attacks such as DNS cache pollution. DNSSEC improves the credibility and integrity of your DNS and protects your domain from DNS vulnerabilities.

KSK represents the Key Signing key (a long-term key), and ZSK represents the Zone Signing Key (a short-term key)

Each zone will be signed with a zone signing key (ZSK). We can use this function to verify the accuracy of the public key.

In addition, this lab also mentions the encryption types of KSK and ZSK. It is shown in this lab that the KSK encryption configuration is more secure than ZSK. Can reduce funnels and risks.

DNSSEC allows clients to ensure that valid signals and information are received from DNS servers. And customers can receive signals and information through this function.

If the sent address is maliciously tampered with, the client cannot resolve the address. At this time, DNSSEC can deny the existence of the address in the domain through the NSEC function.

This lab tells us that the purpose of DNSSEC is to use the full address of the transmitted information to ensure that it comes from the original area.

Lab 13:Implementing a Network Policy Server

Reflection:

The purpose of this lab is to establish a secure VPN connection for the client. This allows users to access foreign websites and some devices. Use the RADIUS server to authenticate users for remote operations and connections.This service is implemented as a Network Policy Server (NPS) in Windows Server 2016.

1: The authentication method used

From this lab we can see that the RADIUS server itself is an authentication protocol. The RADIUS server can achieve the purpose by sharing with the NAS.

The RADIUS server can connect clients to each other through NAS communication. In addition, the messages accessed by the NAS can also be transmitted to the RADIUS server by means of information transmission. This allows for the ability to pass between each other

2: The security policy that was created

We can use the RADIUS server to retain the personal information of the authenticated user. It can then be passed to the NAS via a special delivery method and connected to them

In addition, the security policy plays a strict role in controlling users in the RADIUS server. A full policy grants the user permission to grant or deny access. So that network protection is more secure

3: The accounting method used (i.e Logs)

The Network Policy Server Journal is an identity request between the RADIUS server and the client. Its main task is to track and query diaries.

In this lab. We can connect to other users through the VPN in the RADIUS server. The log file is a very convenient software. Managers can view each user activity logged in or used through a log file. And you can see the cause of some problems in detail.

Critical Thinking Analysis:

This lab tells us to authenticate via the pass between the RADIUS server and the NAS. So we can improve network security

In addition, security policies and logs can effectively control and detect the location and cause of the problem. So that the problem can be solved effectively

WEEK 7: Useful Blog

This week’s blog content is to view the blog content of other students. Find a blog for a student we think is better. This student’s blog will have some guidance and help for our study. And this school blog will give us some information.

So Stewart’s blog is the most helpful of all the blogs I’m looking for.

Blog links:  https://stewartmetcalfe.wordpress.com/

First of all, I think his blog is very layered. He will know how to distinguish each class hour. Includes the year and content for each semester. This is very helpful for our classification. In addition, his writing templates and content ideas are very clear. We can use some search tools to find the topics and questions we need.
Second, I think he has his own point of view on each issue. And it can be very well explained and answered in great detail. Through his point of view, I can see my own lack of answering questions.

通过 WordPress.com 设计一个这样的站点
从这里开始