Wednesday, May 14, 2014

Final Presentation

Here is the link to the Final Presentation Slides
https://docs.google.com/presentation/d/1rPqEydO4Z9Aiyt0YhA6171P2kjyeXlnW7nI3oPUSYtg/edit?usp=sharing

Here is the link to the presentation video:
https://www.youtube.com/watch?v=sSVO2ld81qM







So I have some final words. I used screen-o-matic to do my presentation but somehow managed to fit everything in 15 minutes. Time flies by fast when presenting. So I hope the ending part where I showcased my app didn't feel rushed. If it did, then let me clarify it in writing. I was presenting what the program looks like when a ping is successful and when its not. If it pings the target successfully, it means that you haven't set it up to block unwanted pings and shows port vulnerabilities. If an error page is shown, it could mean a few things. The Ip address does not exist, it does exist but it might have dropped the test packet (it happens sometimes), or that you set up the router/host to drop unwanted pings in which case good job!

Wednesday, May 7, 2014

Network Security App Presentation

Before I begin on my rants, here is the link to the presentation

https://docs.google.com/presentation/d/1rPqEydO4Z9Aiyt0YhA6171P2kjyeXlnW7nI3oPUSYtg/edit?usp=sharing

My plan for the presentation is to describe what I put on the slides. I don't like it when people read off the slides (unless the situation calls for it) and then move onto the next slide. So I will read off the slides, but then I'll discuss beyond that.

Half of the time during the presentation I want to discuss how I got the idea for it, and my journey on working on this program. That will be done through the topics on the slides. The other half I would like to show case the program. Show the viewers how it works, what it does, and the program behind the app. So that's not on a slide, so I'm going to record the screen on a web browser and show case the app

At the end of the discussion I want to tell the audience what I learned, what I need to learn to take this App to the next level, and ending remarks.

Thank you for taking the time to read my blog post.


Thursday, May 1, 2014

Client Again

So I did not meet with my client. I contacted HPU twice. They said they would get back to me but never did. So I have nothing to report. I would imagine that we would have gone over the potential risks of certain aspects of the idea of the program (not sure but they are educated enough to tell me).

Statues update:
Home page is basic, buttons don't work. Program doesn't function the way it should. Having trouble with the basic ideas, and hope to overcome them. It's embarrassing to state what I'd like the program to do and not reach it.

I'm attempting baby steps, like getting ruby to ping another computer , now I just do that in a loop and that's a basic ping attack. A testing mechanism for the program.

Lets see how that goes, next once that's done I can attempt to get program to see IP addresses on network before the mapping network portion of program.

Thursday, April 17, 2014

Lofi Diagram

Here is the image of the lofi diagram


So all my items fit on a single page. At the top of the screen will display the program name "Network Security", at least until I find a better name. There will be three buttons called map lan, test security, user on lan. Each button does there each individual job and when the job is complete, it will display the information on the box below labeled output.

Here is the video of me explaining. I'm talking softly because everyone around me is sleeping and I didn't want to wake them up.


Wednesday, March 26, 2014

User Cases

Hello there and welcome to my blog post. Today I will just post my user cases in a school project of mine.

here are the cases:

So in terms of security for a university its great to understand the process of enrolling. Students can go straight into a university however foreign students need to go through background checks. Registrar personnel have access to system that allows them to override classes where as student access is limited

Here is the link, it explains it much clearer with the pictures provided:
https://docs.google.com/drawings/d/1mJ7aDFj1FGqhwgLvXC28gRl8J7RHG1SldWGoPUjnIw4/edit?usp=sharing

Please don't abuse it guys. E-mail seems to be the primary source of communication at the university I want to work with. They haven't replied back though, again.


Activity Diagram

Hello there. Thank you for reading my post. In this blog I'm going to post a link here to my personal activity diagram to a school project.

I don't know how to post all images from the website but it looks something like this.

E-mail contact -> E-mail reply -> create plan -> deliver plan -> get decision.

Here is the link for a better understanding:
https://docs.google.com/document/d/1ODahvb5QCZEnkvHd687IlZXtkSEp6F1jWTAlYuqIHLk/edit?usp=sharing

Since its a school, I assume they use paper, e-mails, and white boards. I would assume that they use e-mail for primary use of communication. Phones are used, only among staff members.

My meeting notes are short. The staff only replied to my e-mail once. I replied back, but heard no response. I'm assuming that they have not taken my considerations seriously.  Time will tell.


Wednesday, February 26, 2014

My Interview Plan

Setting: The major stakeholder for the IT defense App are the investors, the students, and teachers. I would have to send an e-mail first, probably talking in an office after

Interview plan: I would plan to ask the following questions in the interview Does the university allow students to work with the IT department? Can a student be allowed to work on code that Setting: The major stakeholder for the IT defense App are the investors, the students, and teachers Interview plan: I would plan to ask the following questions in the interview Does the university allow students to work with the IT department? Can a student be allowed to work on code that requires higher security access? Do you know if there is a chain of command in the university that I need to go through in order to make this project? Do you have any suggestions on how we could improve the system or feature requests? Do you have any questions on the reality of this project?

 Followup plan: I would send an e-mail the day after and check up on the progress of my request. If however they denied it on the first try, I would have to find a different company. If I can't I will work on it myself I guess. With a completed version I could show companies a demo and find one that would be willing to improve on it with me