Thomas Botsford

Unit 22 Assignment 1

The Social and Psychological Effects of Computer Games on Individuals and Society   Since the 1970s introduced the world to video games, the industry has been through about 5 decades, an industry crash, a revival, and 8 console generations. Clearly video games have proven to be more than a fad revolving around a digital tennis machine. They’re an enduring, ever evolving revolution in entertainment. The cultural impact of video games is blatant to gen exers and millennials, having grown up…

1
Read More

Unit 32 Assignment 3 Task 3

Task 3 The Advantages and Disadvantages of Securing Wired and Wireless Systems   Wired Network Security   IPSEC Internet protocol security (IPSEC) is the set of protocols used to secure data transfer at the IP layer over wired networks, rather than at the application layer. It encrypts data using one of two modes: transport and tunnel. Transport mode encrypts a packet’s data, but not the packet header, tunnel mode encrypts both. IPSEC-compliant devices are able to decrypt these packets for…

0
Read More

Unit 32 Assignment 2

Unit 32 Assignment 2   Task 1 Auditing Within the context of computer networking, auditing is the process of analysing a network for its usage and security. There are several third-party auditing applications available, but Microsoft Windows comes built in with tools for auditing. Audits can also be done manually without software, but I will be looking at the effectiveness and uses of automated audits. Auditing tools carry out automated scans (audits) that determine the security and functionality of a…

0
Read More

Unit 32 Assignment 1

Unit 32 Assignment 1 Task 1   Six Possible Threats to Networks   Distributed Denial of Service (DDoS) Attack A DDoS attack is a form of cyberattack that targets a network with large numbers of data packets as a means to overload it. While under attack, networks will become effectively unusable as the high amount of traffic will make it extremely difficult for client devices to make use of the bandwidth. Botnets (also known as “Zombie Armies”) are a common…

0
Read More