Wednesday, February 18, 2009

Communication ControL..

Communication (network) controls secure the movement of data across networks.A few example of it is :-

=>Firewalls
-is a system that prevents a specific type of information from moving between untrusted networks,such as the Internet, and private networks,.Put simply,firewalls prevent unauthorized internet users from accessing private networks.
-can consist of hardware or software or both.

-Used on;-
-- basic firewall fo a home computer. In this case, the firewall is implemented as software on the home computer.
--an organization that has implemented an external firewall,which faces the Internet, and an internet firewall,which faces the company network.A demilitarized zone (DMZ) is located between the two firewalls. Messages from the internet must first pass through the internet firewall. If they conform to the defined security rules,then they are sent to company severs located in the DMZ.These servers typically handle Web page requests and e-mail. Any messages designated for the company’s internal network (for example, its intranet) must pass through the internet firewall, again with its own defined security rules, to gain access to the company’s private network.
-The danger from viruses and worms is so severe that many organizations are placing firewalls at strategic points inside their private networks. In this way, if a virus or worm does get through both the external and internet firewalls, then the internal damage may be contained.

=>Anti-malware systems

-Also called AV or antivirus software,are software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
-For example, Avira , Norton and whatsoever.
-anti malware system are generally reactive.It works by creating definitions, or signatures,of various types of malware,Next,updating these signatures in their products and then examines suspicious computer code to see if it matches a known signature. If it does,then the software will remove it.
-Nowadays there are anti-malware systems that function proactively as well as reactively. This systems evaluate behavior rather than relying on signature matching.In theory, it is possible to catch malware before it can infect system.Example (www.cisilion.com/cisco-security-agent.htm) and www.prevx.com .


Top ten antivirus:-


#1 Bit Defender Antivirus (Actualy I Hate It.hehe)



#2 Kaspersky-Anti-Virus



#3 Webroot Antivirus



#4 G DATA Antivirus



#5 ESET Nod 32



#6 Paretologic Anti-Virus Plus



#7 AVG Antivirus




#8 Vipre Antivirus Antispyware




#9 F-Secure Anti-Virus



#10 Trend Micro



Chriteria That is Count For Rating
~Ease Of Use
~Effectiveness
~Updates
~Feature Set
~Ease Of Installation
~Help/Support
(http://anti-virus-software-review.toptenreviews.com/)



=>Whitelisting and Blacklisting
-99 percent of organizations had anti malware systems installed, but 62 percent of companies still suffered successful malware attacks.
-One solution to this problem is whitelisting and blacklisting. Whitelisting allows nothing to run unless it is on the whitelist while blacklist allows everything to run unless it is on the blacklist.
-In more details, whitelisting is a process in which a company identifies the software that it will allow to run and does not try to recognize malware.
-it permits acceptable software to run and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity.
-while blacklist includes certain types of software that are not allowed to run in the company environment.For instances,a company might blacklist peer –to – peer file sharing on its systems.
-In addition to software, people,devices, and Web sites can also be whitelisted and blacklisted..


Some nice words.."Trollope admitted that poor performance was the main reason Norton Internet Security customers abandoned previous versions of the product. In the next version, he explained, a "whitelisting approach" significantly reduced the amount of time scanning files that are known to be safe.

"It does use whitelisting as an approach, but it really focuses on the performance gains we can get by not having to scan things on the whitelist," he said. Norton 2009 security suite, according to the company's vice president of consumer engineering, Rowan Trollope."(This word i take from http://keznews.com/4878_Norton_2009_tackles_whitelisting.htm..)

=>Intrusion Detection Systems(IDS)

-Is a software or a hardware that are designed to detect all types of malicious network traffic and computer usage such as accessing, manipulating or disabling of computer systems that cannot be detected by a firewall.These systems capture all network traffic flows and examine the contents of each packet for malicious traffic.
-An example of this type of malicious traffic is a denial – of – service attack.
-An IDS can be composed of several components:
Sensors which generate security events,
a Console to monitor events and alerts and control the sensors, and
a central Engine that records events logged by the sensors in a database and uses a system of rules to generate alerts from security events received.
-There are several ways to categorize an IDS depending on the type and location of the sensors and the methodology used by the engine to generate alerts. In many simple IDS implementations all three components are combined in a single device or appliance.
Types of IDS
-A network intrusion detection system (NIDS)
-A protocol-based intrusion detection system (PIDS)
-An application protocol-based intrusion detection system (APIDS)
-A host-based intrusion detection system (HIDS)
-A hybrid intrusion detection system combines two or more approaches for examples prelude.


My References
Information Literacy Book Page 85-86
http://www.mcafee.com/
http://www.avg.com/
http://www.symantec.com/norton/antivirus
http://www.avira.com/
http://www.keznews.com
http://www.wikipedia.com
http://www.cisilion.com/cisco-security-agent.htm
http://www.prevx.com
http://searchexchange.techtarget.com/sDefinition/0,,sid43_gci896131,00.html(Whitelist)
http://www.ipcortex.co.uk/wp/fw.rhtm (Internet firewall tutorial)
http://netsecurity.about.com/cs/hackertools/a/aa030504_2.htm (Intrusion Detection System)

Monday, January 19, 2009

Support For Palestinians!!




Hingga hari ini kita menyaksikan penindasan kaum muslimin Palestin oleh kaum yahudi. Seperti yang sudah-sudah, kita bosan melihat tingkah Barat dan kaum muslimin sendiri yang tidak melakukan aksi nyata. Oleh karena itu sebagai kaum muslimin yang jauh dan tidak berdaya mari kita membaca Qunut Nazilah yang intinya mengutuk penindasan kaum muslimin, dan melindungi kaum muslimin Palestin. Kerana Allahlah Tuhan tempat kita meminta pertolongan.





Kita juga boleh membaca surah Al-Fil:
“Ya Allah!!Sebagaimana Engkau Pernah menghantar burung-burung ababil menghancurkan tentera bergajah Musyrikin, maka kami memohon kepada mu Ya Allah… turunkan lah bantuan mu kali ini kepada orang orang Islam di Libanon/Palestin, hancurkanlah rejim zionis. Amin. …
> >(membayangkan kehancuran tentera Yahudi - dengan Izin Allah)
Pastu baca surah Alf-Fil...* (Nota: Bacaan ayat Quran dalam bentuk tulisan rumi boleh mengandungi kesilapan. Bacaan yang terbaik adalah dalam bentuk tulisan Arab itu sendiri. Harap maaf sekiranya terdapat kesilapan pada tulisan rumi tersebut).

Boycott This Products!!


Wednesday, January 14, 2009

Cyber Squatting???

Definition??
Cybersquatting – the unauthorised registration of domain-names featuring a brand name.

How It Works??
This is a cheap and simple method to take advantage of another’s off-line brand
reputation.

Example??
www.sony.com(Official Sony Corporation)
www.soni.org (No Information as the plugin is missing..heheh)

www.sonidesigns.com(Boutique)


www.puma.com(Official PUMA brand website)
pumapac.org(People United Mean Action)
www.pumastrut.com(United Kingdom company specializing in releases on the vinyl 45 format)
chocolatepuma.com(Duno wat is this)

www.asadi.com.my(Official Branded Footwear)

www.
asadi.org (Bibliography)

www.asadi52.8k.com(Saeid Asadi)
www.asadi-machinery.com (Asadi Machinery PolyUrethane Equipment)
robots.asadi.org (The Brave New World)

The information about 3 different books from human sciences,law
and technology field is...

Human Sciences
Ethics & Human Sciences/Keith Amarakore,Sukhmeed S.Panesar
Author's Name : Amarakore and Keith
Subjects : Medical Ethics
Call NO. : R724A485E
Barcode : 00001063531
ISBN : 0723433461(p.b.k) & 9780723433460(p.b.k)

Law
Admiralty Law & Practice / Toh Kian Sing
Author's Name : Toh Kian Sing
Subjects : Admiralty-Malaysia & Admiralty-Singapore
Call No. : d27KPP93T645A
Barcode : 00000554895
ISBN : 0409999091

Technology
Information Technology : Design & Applications Edited By Nancy D. Lane & Margaret E. C hisholm
Author's Name : Boston,Mass. : G.K Wall,1990
Subjects : -Library Science - Technological Innovations.
-Information Technology - Law & Legislation
-Libraries - Automation- Computer Optical Discs.
Call No. : Z678.9143L
Barcode : 00000055773
ISBN : 0816119082

staff.iiu.edu.my/masmadyz
I like about this blog because....

1.The colour choosen are suitable with Bro Asmady personality and so attractive..He avoid the viewer from having pain in their eyes because the use of bright colour..heheh
2.The organize of the content is systematic with a little bit islamic information that is Prayer Time..Heheh ..This blog have shoutout box for student to impress whatever they want...
3.The important things about this blog is Bro Asmady keep it simple where he give a short decription but full of information and some attractive picture for his students..


URL's name for Kuliyah ICT is..
http://www.kict.iiu.edu.my


List of Red Spot books collection that I found in the library which are mostly used by IIUM's student at PJ Campus ..

1.Architecture of Siam - A Cultural History Interpretation By Clarence Aasen.(ISBN 983-56-0027-9)
2.Bali Style by Rio Helmi & Barbar Walker.(ISBN 0-500-28415-6)
3.Fundamentals of Chemistry Third Edition By Ralph A. Burns.(ISBN 0-13-918665-4)
4.Chemistry Principles And Reactions Fifth Edition By Masterton & Hurley.(ISBN 0-534-40878-8)
5.Precalculus Enhanced With Graphing Utilities By Michael Sullivan And Michael Sullivan III (ISBN )
6.Organic Chemistry By LG Wade And JR.(ISBN 0-13-922741-5)
7.Human Anatomy & Physiology Fifth Edition By Elaine N. Marieb.(ISBN 0-8053-4989-8)
8.Organic Chemistry By Jenice Gorzynski Smith(Text ISBN 0-07-239746-2,Component of Pkg ISBN 0-07-310170-2)
9.Biology Seventh Edition By Campbell Reece.(ISBN 0-8053-7146-X)
10.Biology A Functional Approach Students Manual By TJ King.(ISBN)
11.Calculus For Engineers By Donald Trim(ISBN 0-13-085603-7)
12.Calculus Fourth Edition By james Stewart.(ISBN 0-534-35949-3)
13.Chemistry The Central Science Ninth Edition By Brown,LeMay And Bursten.(ISBN 0-13-066997-0)
14.Introductory Chemistry Second Edition By Steve Russo & Mike Silver.(ISBN 0-321-04634-X)