2015年5月31日星期日

my exam revision

Exam Revision

Cyber Security:

·         Know and be able to write down the research you conducted  for your oral presentation
o   Refer to your own research
o   Understanding the definitions will help you recall them
o   It’s not a memory game!
o   Share and swap your research with your classmates for more in-depth knowledge!

·         Know cyber security and hacking definitions:
o   Refer to powerpoints on S:drive
o   Powerpoints direct you to other websites

Microsoft Excel:

o   Basic understanding of how to use Excel
o   Excel terminology
o   Formulas and functions
o   Charts
o   Refer to powerpoints and videos on S:drive

Microsoft Access Database:

o   Understand what a database is
o   Understand what it is used for
o   Know theory of data and information
o   Microsoft Access terminology including but not limited to fields, tables, primary key, data type etc
o   How to use Microsoft access
o   Refer to powerpoints and videos on S:drive
o   Relationship types and what do they look like: one to one, one to many
o    

Binary:

o   Understand which number represents the “on” and “off” position
o   Understand the Binary values
o   What does ASCII stand for

Data / Information

o   What is data
o   What is information
o   How to protect data
o   What are the stages of the PSM
o   Metadata definition

o   The role of a forensic scientist

2015年5月28日星期四

case

Our client, one of the UK's most successful providers of airline support services, suspected a member of staff of accessing illegal content policy.  The suspicion had been triggered by the re-occurrence of a virus known to originate on these types of sites.
The client enlisted Cyber Forensics to conduct an investigation to determine if the user had intentionally accessed inappropriate material.



As a Cyber-Forensic investigator, reflect and use examples of the work completed this semester to discuss how you would lead this investigation and what needs to be completed in you role from the start to the finish of the investigation. Make sure you include the files or software on the drive that would inform you about the perpetrator and any recommendations you would put in place to restrict this type of crime being committed in the future.

2015年5月25日星期一

Digital Investigation

I need to create a functional database to record digital crimes, to make the data more clearly. And then I need to use the database I created to keep track of a criminal activity. (Use Qry&Forms).

2015年5月10日星期日

Validation

-The purpose of Validation and masks
A validation rule limits or controls what users can enter in a table field or a control (such as a text box) on a form.When you have several people entering data in your database, you can define how users must enter data in specific fields to help maintain consistency and to make your database easier to manage.
-what is the 'like' and 'or' feature in Validation
You can use keyword operators such as "between," "like" and "not" 
to restrict types of data.



2015年5月7日星期四

Create relationships



Today I learnt about how to build a relationships in database , I watched a video of '

Understanding types of relationships' ,and followed the steps in Word . Finally , I know how to edit the relationships .



2015年5月4日星期一

how to build queries

today i learnt how to build queries ,
EXERCISE 1: CREATE A SELECT QUERY FROM A SINGLE TABLE
The practice database opens but does not display any tables or other objects. These steps introduce the Query Designer. The
designer gives you the most control over a query.
1. On the Message Bar, click Enable Content.
2. On the Ribbon, click the Create tab, and in the Queries group, click Query Design.
The designer opens and displays the Show Table dialog box.
3. In the Show Table dialog box, click Assets (if it isn't already selected), click Add, and then click Close to close the
dialog box. The Assets table appears in the upper section of the designer.
4. In the designer, drag the bottom edge of the Assets table downward, so you can see all the fields.
5. In the Assets table, double-click the Item field to add it to the query. The field appears in the grid at the bottom of the
designer. You can also drag fields from the table to empty columns in the grid.
6. Repeat step three and add the Supplier, Description, AcquiredDate, and PurchasePrice fields to the query.
7. On the Design tab, in the Results group, click Run.
The query loads the data into a datasheet.
8. Press CTRL+S to save the query. In the Save As dialog box, enter qryAssets, and then click OK.
Starting the name with “qry” is a fairly standard naming convention, and it tells you at a glance that it's a query. Notice that
a new group called Queries appears in the Navigation Pane, and your query appears in that group.
In its current state, the query acts like a filter, showing you just the data you want to see from a given table. You can use
the query in a variety of ways — as the data source for a form or report, for example — but in its current state, the query
isn't much different from the underlying table. The next exercise adds some power to the query.
EXERCISE 2: MAKE THE QUERY ASK YOU FOR INPUT (ADD A PARAMETER TO THE QUERY)
Adding a parameter to a query is a common database task. The parameters in this exercise make the query ask you to enter
starting and ending dates before the query runs. The query then returns any records that fall between the dates you enter.
This exercise uses the query you created in the first exercise.

2. Highlight the following criteria, including all opening and closing brackets, and then press CTRL+C to copy:
BETWEEN [Start Date] AND [End Date]
3. In the design grid (the lower part of the designer), in the AcquiredDate column, click the Criteria row, and then press
CTRL+V to paste the string you copied in step 2. Click and drag the right edge of the column until you can see whole
criteria string. Your results should look like this:
4. Press CTRL+S to save your changes.
5. Go to the Ribbon, and on the Design tab, in the Results group, click Run.
6. In the first Enter Parameter Value dialog box, enter 4/12/2013 and click OK.
7. In the second Enter Parameter Value dialog box, enter 3/18/2015 and click OK.
The query returns only the records that fall within your starting and ending dates.
EXERCISE 3: ADD A CALCULATED FIELD TO A QUERY
In addition to using criteria, you can also add calculated fields to your queries. A calculated field uses a formula or expression
— an object that can perform calculations and other tasks such as data validation — to calculate a value, something you can't
do in your database tables. This exercise shows you how to calculate a depreciation amount for each asset.
1. Right-click the qryAssets document tab again and click Design View.
2. In the AcquiredDate column, remove the criteria from the Criteria row. Don't delete the column, just the criteria. Doing
so makes the query easier to run.
3. Copy this formula. Make sure you copy the entire formula:
Depreciation (30%): [PurchasePrice]*0.3
Note We'll explain the formula later. For now, just use it.
4. In the design grid, go to blank column next to the PurchasePrice field, click the Field row, and press CTRL+V to paste
the copied formula into that row.
Make sure you have the entire formula in the field. If necessary, click and drag the right edge of the column until you can
see the whole formula.
5. Press CTRL+S to save your changes.
6. Go to the Ribbon, and on the Design tab, in the Results group, click Run.
The Depreciation (30%) field appears in your record set, even though it doesn't exist in your tables, and it never will. Briefly,
here's how the formula works:
• Depreciation (30%): is the name of the calculated field. Be sure to use a colon (:) to separate the name from the rest of
the expression.
• [PurchasePrice] is the name of the field that contains the values you want to use in your calculation.

• *0.3 is actually two parts — the multiplication operator (*) and the value by which you want to multiply your purchase
prices (0.3).
So, the formula calculates 30 percent of each value in the PurchasePrice field. Calculated fields save a lot of time because you
only have to "do the math" once, and you get the latest figures each time you run your query.
Also, remember that in Access 2010, you now add calculated fields to your tables, something you can’t do in any previous
versions. Technically, a calculated field violates some principles of database design – you separate your data from anything
that operates on that data, and you can’t store calculated values in your data. Access works around that by normalizing data
for you behind the scenes in a set of system tables.
We don’t have time to cover calculated table fields in this course, but put briefly: Instead of entering a formula in a query, you
enter it in a new table field. Finally, you can also use calculated fields (in queries or tables) in your forms and reports. For more
about using calculated fields in tables, and about using formulas and expressions, see the links in the Quick Reference Card.
EXERCISE 4: FORMAT THE CALCULATED FIELD
After you add a calculated field, you can apply a format to the field. Doing that can make the data easier to understand.
1. Right-click the qryAssets document tab again and click Design View.
2. Right-click anywhere in the Depreciation (30%) field and click Properties.
3. The Property Sheet task pane appears.
4. On the General tab in the task pane, click the blank cell next to Format.
5. Click the arrow that appears, select Currency from the list, and then close the task pane.
6. On the Design tab, in the Results group, click Run to test your query.
The Depreciation (30%) field now shows currency values. That can help someone understand the data with just a glance.
EXERCISE 5: CREATE A QUERY FROM MULTIPLE TABLES
When you're new to Access, the Query Wizard provides the easiest way to create a query that uses multiple tables as a record
source. These steps explain how to create a query that matches assets with the company that supports them.
1. On the Ribbon, click the Create tab, and in the Other group, click Query Wizard.
2. On the first page of the wizard, make sure Simple Query Wizard is selected, and then click OK.
3. Open the Tables/Queries list and click Table: Assets to select the Assets table.
4. In the Available Fields pane, click the Item field.
5. Click the right-arrow button to move the Item and Description fields to the Selected Fields pane, like so:
6. Go back to the Tables/Queries list and click Table: Support to select the Support table.
7. Repeat steps 4 and 5 to select and move the SupportCompany, Phone, and Fax fields to the Selected Fields pane, then
click Next.
8. In the What title do you want for your query text box, enter qryAssetsAndSupport, and then click Finish.

The query tells you which company to contact when you need parts or service for an asset, but it could tell you more. The next
exercise shows you how.
EXERCISE 6: CONCATENATE FIELDS WITH AN EXPRESSION
These steps show you how to use the query designer to concatenate the first name and last name fields from the Support table
into a single field in a record set.
1. Right-click the qryAssetsAndSupport document tab and click Design View.
2. Copy the following string. Make sure to include the closing bracket:
Contact: [Support].[SupportFirstName] & " " & [Support].[SupportLastName]
3. Locate the first blank column in the design grid, and in the Field row, paste the string you copied in step 2.
4. Make sure the check box in the Show row of the new field is selected, and then run your query.
The record set now includes a field called Contact, which in turn shows the full name of the person you call for help.
Briefly, here's how the expression works:
• Contact is the name you want to give your calculated field. Be sure to use a colon (:) to separate the field name from
the rest of the expression.
• [Support.SupportFirstName] is the name of the table (Support) followed by a period, followed by the name of the first
field you want to concatenate.
• & " " & inserts a space between the fields. The ampersand operators append the space (defined by the double quotes)
to each field. Whenever you want to display text or punctuation marks in your record set, you surround what you want to
see with double quotes.
• [Support.SupportLastName] is again the name of the table, a period, and the name of the second field you want to
concatenate.
You can add field and table names to this type of expression until your expression reaches 1,024 characters. As always, links
in the Quick Reference Card take you to more information.

2015年4月30日星期四

Murder Mountain assignment6

I found the answer by looking at the witness 1 statement, it tells me that she saw either red hair or brown hair, so I searched red hair first or brown hair. Then it tells me that her shoes were size 6 and the person that she is describing, the shoes were bigger than size six, so I searched any size above size 6.
I found the seven answers by then.
And from witness 2, I know that if the car came from New York, the home town search has to be NY, so I filtered NY. Meanwhile, the witness 2 statement told me that the killer's first name begins with an E so I answered in the box *E and the last name’s first letter begins with a S, so I wrote *S. It says that the climb time was the same as the person who was giving the statement. She said that she had been climbing for 7 hours. So therefore the climb time was 7 hours.
I wrote down the four suspects that I got, they were
1) General Willis
2) Jack Spratt
3) Edith Summerson
4) Eleanora Springston
But finally—



I found the killer was Edith Summerson.


2015年4月26日星期日

Mountain Murder - Database

·        i  wrote an explanation for my findings of assignment 3 :1.       I knew it was rick reaper because i used filter by form and i typed in sea* under home town and i typed in *2448 under local phone and clicked filter.
2.      
when I typed in home town sea* and local phone *2448 it came up with rick reaper and home town Seattle, WA and local phone number 984-2448.

2015年4月20日星期一

Hacking-Terms&Techniques

KEYLOGGERS

•What is it?

A Key logger is “a non-destructive surveillance program” that involves the hacker tracking and recording every key that is pressed on a technological device, as well as the exact touchscreen points made by the user of the device. It can also be considered either a “spyware or a software”. The recording that is “collected can then be saved as a file and/or sent to another device”, making it possible for another individual to see every keystroke and touchscreen point that was made by the user. This results in the possibility for a black hat hacker to recreate the user’s login IDs and passwords and put personal information at risk. However, can also be used as a surveillance tool by employers to ensure that their workers are on task.

•How do they do it?

The log file that is created by the Key logger hackers are most commonly buried onto a particular device, network or system using a “Trojan that is delivered by a phishing email” or a text message to a specific or random user. 

 

ADWARE

•What is it?

Adware is a software that is designed to constantly and “automatically generates advertisements” to display on your technological system. Adware is sometimes malicious and will involve frustrating and constant “pop up ads that will often slow down or sometimes even shut down your system and its resources.”” 

•How do they do it?

Adware can be “included within some purchases or downloads” of particular programs, as a genuine and legal method of creating advertising profits for a business or organisation. In addition, “going on an infected website” can led to gaining an illegal installation of Adware.  Your device can also be infected from a certain browser’s vulnerability and also Trojans that are designed for stealthy installation of adware.  

 

VIRUSES

•What is it?

Computer viruses are simple programs or codes that are design by malicious programmers in order to harm and cause problems for the device and the owner of the device. The damage that viruses cause can vary from being just a minor inconvenience and frustrating or being disastrous with erasing data, corrupting files, taking down your whole computer system.  

•How do they do it?

The infection of viruses are most commonly gained from opening  false email attachments. However they can also be gained from the download or purchase of illegal software and infected files. Viruses spread by multiplying itself repeatedly and attaching itself to other files within the device, therefore infect other devices.

 

WORMS

•What is it?

Worms are self replicating malware systems which are able to view files on the system and also cause lag. However, it does not report back to the hacker. A worm is quite similar to a virus as it's a destructive self-contained program that can replicate. However, a worm does not need to be a part of another program and it can copy and transfer itself to other systems. A worm can become dangerous if not isolated and removed. .But it usually doesn't do more than damage or ruin the computers. A worm can replicate out of control can consume system resources, until a system becomes unstable and unusable. 

•How do they do it?

The infection of worms are most commonly gained from opening  false email attachments or accepting internet ads. 

 

TROJANS

•What is it?

A Trojan, or Trojan Horse, is a malicious program disguised as a valid program. This makes it very difficult to distinguish it from real programs that are actually supposed to be there. A Trojan can destroy files, alter info, steal passwords or information etc. On the other hand it may stay dormant until a hacker accesses it and take control of the system. A Trojan is a lot like a virus, but without the ability to replicate.

•How do they do it?

Trojan is similar to adware and spyware, it can be “included within some purchases or downloads” of particular programs, “going on an infected website” or being infected from a certain browser’s vulnerability.

 

SPYWARE

•What is it?

Spyware is a malware software designed to gather information about a user’s computer, without them knowing about it. It can just track a user’s Internet habits for advertising purposes or it can scan computer files, keystrokes, create pop-up ads, direct you to websites etc. Most commonly it is used to generate a pop-up ad informing you that your system is infected and force you to a page that has the solution. 

•How do they do it?

Spyware is similar to Trojan and adware where it can be “included within some purchases or downloads” of particular programs, “going on an infected website” or being infected from a certain browser’s vulnerability and Trojans.

 

ROGUE SECURITY SOFTWARE

•What is it?

This comes under malware. It is a form of internet fraud that can be based on false positives. It is when a hacker deceives the computer user that there is something good happening, where it is actually the opposite of something harming your computer or doing nothing at all. A common example of this is when a software you are paying for to protect your computer but it just ends up doing nothing which is a scam. 

•How do they do it?

They mislead a computer user into paying money for false systems that are said to will remove a malware that your computer has. Therefore it is included in the purchase of false software. 

 





 



Introduction to Databases




Introduction to Databases (watch the introduction part of the video)


1.    What is the difference between raw data and information?
·         Row data need to be structured in meaningful ways to becom useful information.
2.    Provide a definition of what a database is?
·         A database is a collection of data.
3.    Give examples of what a database can do?
·         Sorted searched analysed Make data into useful information.
4.    Information is very valuable to organisations, what might an organisation use a database for?
·         To store students’ contact details .
5.    Give examples of how Brentwood uses databases to store your information.
·         To track information about the students’ address and phone numbers .
6.    What does DBMS stand for?
·         Databases management system.
7.    Give three examples of names for DBMS software
·         ORACLE DB2 MICROSOFT ACCESS
8.    What type of websites have databases at their back end?
·         E-commerce social-website you-tube

9.    Databases can store not only text but also other media files such as….
·         Photo, music and radio
10. How might an individual use a database –

·         To manage a CD library , cooking recipe , or tax information .

2015年4月16日星期四

Hacking

what did you learn?
I learnt about what's hacking , the different sort of hacking , some definitions of hacking terms like virus , computer worms and Trojan horses . I

what did you find interesting ?
I think the research on hackers is interesting , I get to know the stories of the hackers .

did you learn anything from other presentations ?
Yes . I learnt other new hacking words and other hackers .

after finishing the hacking activities , did you find it hard ? was it harder than you  thought it would be ?
I think it't a little hard for me to understand what's required to do form the questions , and that's the first time i see Harvard Style Citation . But it's easier than i thought .

hacking and hacker

During the holiday , I did a PPT about hacking and hacker . I learn the definitions of hacking and some terms from that , and I know the good and bad outcomes ,and I also did a hacker .

2015年3月27日星期五

Binary

We learned about binary before. Binary consists of only two numbers, 1 and 0.
0 means off and 1 means on.
I also learned that there are 8 bits in 1 byte, of which the 8 bits are the combination the binary, 1 and 0.