Friday, February 26, 2010

Activity 1 – Professional Organizations

1. What are some benefits of joining (IT) professional organizations?
Answer: The benefits in joining IT professional organizations are you will have the environment in practicing your expertise, gain a network of competent people in IT which help you in finding a job, and they make your IT skills and knowledge more credible and reliable to others.

What might be some disadvantages?
In your discussions mention at least three (3) local or regional, two (2) national, and five (5) international IT professional organizations including their brief profile.
Answer: The disadvantage would be your going to meet the high expectations of others since you're a member of a competent IT organization.


2. Should an IT Professional either be licensed or certified? Why or why not?
Answer: IT professional for me should be licensed or certiified. In this situation, like other professions such as Accounting, Teaching, or Nursing, IT should have a license in which this proves that the skills of a certain IT professional are reliable and had passed the standard requirements. It allows them to measure their skills and knowledge whether they are competent and capable enough.

3. As an IT graduating students of the College, what Certification or Licensing you are aiming for? Why?
Answer: As an IT graduating student, I am aiming for any certification that are recognized nationally, and internationally. Thus, these tranings, seminars, and workshop are very relevant for me in order to improve my skills, and further my knowledge in IT. Perhaps these certifications would be the proofs. Furthermore, I want to have a certification in Networking, Programming-Java, PHP, Javascript, Ajax, and others. Also, certification in Hardware and Software. It is my point of view that the more certificate you have possessed, the more competent and productive you are.

What is profession? professional? and their differences?

Profession definition.
  • the body of people in a learned occupation; "the news spread rapidly through the medical profession"; "they formed a community of scientists"
  • an occupation requiring special education (especially in the liberal arts or sciences)
  • an open avowal (true or false) of some belief or opinion; "a profession of disagreement"
  • affirmation of acceptance of some religion or faith; "a profession of Christianity"
    wordnetweb.princeton.edu/perl/webwn
Professional definition.
  • engaged in a profession or engaging in as a profession or means of livelihood; "the professional man or woman possesses distinctive qualifications ...
  • a person engaged in one of the learned professions
  • an athlete who plays for pay
  • master: an authority qualified to teach apprentices
    wordnetweb.princeton.edu/perl/webwn

In my own opinion, profession is the job description of a certain individual(s), the professionals. Thus, it is the career they had taken and the best work they had practiced. In contrary, Professionals are referred to us the people having the profession.
TYPES OF ATTACKS

  • DoS- Denial of Service
  • Trojan Horse - Comes with other software.
  • Virus - Reproduces itself by attaching to other executable files.
  • Worm - Self-reproducing program. Creates copies of itself. Worms that spread using e-mail address books are often called viruses.
  • Logic Bomb - Dormant until an event triggers it (Date, user action, random trigger, etc.).
Hacker Attacks are various forms that exploit weakneses in security. Many of these may cause loss of service or system crashes.
  • IP spoofing - An attacker may fake their IP address so the receiver thinks it is sent from a location that it is not actually from.
  • Gaining access through source routing. Hackers may be able to break through other friendly but less secure networks and get access to your network using this method.
  • Man in the middle attack -
    • Session hijacking - An attacker may watch a session open on a network. Once authentication is complete, they may attack the client computer to disable it, and use IP spoofing to claim to be the client who was just authenticated and steal the session.
  • Server spoofing - A C2MYAZZ utility can be run on Windows 95 stations to request LANMAN (in the clear) authentication from the client. The attacker will run this utility while acting like the server while the user attempts to login. If the client is tricked into sending LANMAN authentication, the attacker can read their username and password from the network packets sent.
  • DNS poisoning - This is an attack where DNS information is falsified. This attack can succeed under the right conditions, but may not be real practical as an attack form. The attacker will send incorrect DNS information which can cause traffic to be diverted. The DNS information can be falsified since name servers do not verify the source of a DNS reply. When a DNS request is sent, an attacker can send a false DNS reply with additional bogus information which the requesting DNS server may cache. This attack can be used to divert users from a correct webserver such as a bank and capture information from customers when they attempt to logon.
  • Password cracking - Used to get the password of a user or administrator on a network and gain unauthorized access.