Example of Network Recommendations

 Perimeter firewalls are required by NewCo in order to block unauthorised access to their network. PC and Network passwords are not sufficient protection against threats from the internet. A firewall achieves protection by restricting network access by using rules and only allowing curtain traffic to pass through into the network. Typically this is achieved by blocking ports and restricting open ports to specific devices.
The term perimeter in this instance refers to a firewall that resides on the outside of the network, rather than personal firewall software. The perimeter firewall will receive all inbound network traffic and behaviour accordingly.

... Continue Reading

What is an Ethical Hacker?

Ethical hackers are computer and network experts who specialise in testing the security of an employer’s network. They look for vulnerabilities in a security system that malicious hackers could exploit. This type of hacking is also referred to as penetration testing, intrusion testing and red teaming.
An ethical hacker will employ the same techniques and methods as a malicious hacker but instead of exploiting the weaknesses, will produce a detailed document on the problems found. Typical vulnerabilities NewCo can expect from the test will include design flaws, configuration errors and software bugs.

... Continue Reading

Advanced Server Technologies

The goal of this report is to identify the current techniques for the implementation of scalable and highly available servers, the description and critical evaluation of a particular advanced server and the justification of advanced servers in business.

... Continue Reading

Advice for Project Managers

The project manager's job is to direct, supervise and control the project from beginning to end. A project manager must define the project and with their members break the problem down into manageable tasks. At this stage it is important to analyse your project members, possibly by doing a group skills gap chart or getting your team to list the tasks they think best suit them.

... Continue Reading

Different design and development approaches

The waterfall approach is a number a small development steps. A step does not start until the previous step has been completed, although in practice there is often considerable overlap. A key output in a waterfall project is the User Requirements Specification. This is a detailed non-technical document that forms the basis for the new system and covers its functionality as a whole. Before a waterfall’s steps are decided a feasibility study is done, in order to answer questions like, can we solve it, should we solve it and what is the most cost-effective solution.

... Continue Reading