Monday, December 31, 2018

Google AIY Voice Kit

Welcome to the new year! Last time we posted we talked about working with the google AIY voice project kit. This was a while ago, but here is a condensed update on the AIY Google Voice Kit.

The Google voice kit is available for any price from around 5 dollars, to the price at Target which is 49.99.

The AIY daughter board installed.
It makes me sad that some stores would take advantage of the interest of developers and interested adventures to mark the product up so high, but please check the price where you buy it to insure you are getting a fair market price for your expense.

Alright, the Google Voice Kit, all the parts add to the Raspberry Pi are included in the kit. These parts include the daughter board, a button, stereo microphone board, and speaker. Along with the various wires need to connect this project. A cardboard box is included as part of the kit that is designed to house both a Raspberry Pi and all the kit parts.

However, with my Raspberry Pi it is already mounted to a 7 inch touch screen in a form fitting case. So the question that was left will the case allow for the new daughter board? The answer is yes it can be fitted inside of the case, however due to the height of the daughter board the rear panel will not remain on, without tape.

The instructions are easy to follow. Their is one point to press in the development of this kit, the AIY kit to follow the projects within the kit, utilize a Raspbian image. This image is downloaded and installed on an micro SD card for use as the operating system on the Raspberry Pi.

It is available at this link: The AIY Raspbian OS.

Once all assembled the Raspberry Pi can utilize the new daughter board to listen to and record sounds, as well as a speaker to provide output and feedback. The microphone is useful and can easily pick up a conversation around it. A bit of python code is provided already written when installed on the desktop. With this code examples are provided that check the network connections, speaker, and microphone. After using this code one can follow the project book and discover ways to utilize the Voice Kit with the Raspberry Pi.

If one inspects the daughter board, one will see that the board can be a more versatile board in that it has unused pin outs to add a second speaker for stereo sound, as well as four pin outs for servo connections.


Google AIY Project can be found here.

Monday, June 4, 2018

Google(or should I say Alphabet) is now getting into the add on module market with a few kits that they are releasing through AIY Kits from Google. One can find these kits now at your local shops or online at the shops that are selling the Raspberry Pi. Currently there are two kits available one is a "Voice" kit and the other "Vision". At my local store I was able to pick up the voice kit for around 5 dollars. After beginning assembly of the Raspberry Pi Voice kit, I was disappointed that the voice hat was going to have an issue as my primary Raspberry Pi was using the 7 inch touch screen. There is however another Raspberry Pi out which I am considering purchasing to build the voice kit, this is the Raspberry Pi Zero WH (with header). The Pi zero is a 1 Ghz single core computer, with 512Mb of ram, WiFi and BLE support (wireless networking and low energy bluetooth). Standby for now and I will finish writing the report on it in a bit.
Google AIY Project can be found here.

Friday, May 4, 2018

The City of Houston and Microsoft has partnered to create the nation’s first “Internet of Things” alliance.  This partnership will be aimed at digital literacy. Microsoft says they will focus on 5 communities where they will be giving people the skills they need to develop careers in an increasingly digital world. The focus is on science, technology, engineering and mathematics education programs.

The “internet of things” has far reaching potential and benefits.  One common example is when smartphones receive software upgrades to fix bugs. Another impressive one comes from electric car company Tesla, which resolves problems in cars without recalling them to the dealership. For example, upon discovering that a charger plug was a potential fire hazard, it was able to fix the issue in 29,222 vehicles via a software update.

Another overriding benefits of the “internet of things” for marketers is the vast amount of data that can be harnessed from devices. Not only can this data help to inform wider product development, but it can also be used to create meaningful and personalised interactions with consumers 24 hours a day, seven days a week.
Alongside this, it also means that customer service will be able to evolve. If a non-connected device malfunctions, it would currently be up to the consumer to take action. Whether that means searching for a solution online, enquiring of customer service, or returning it to the manufacturer. 

Ngozi

Gilliland, N., & Econsultancy. (2018, May 02). How the internet of things can improve customer experience. Retrieved from https://www.econsultancy.com/blog/69988-how-the-internet-of-things-can-improve-customer-experience


May the Fourth

Today is May the fourth, and when we think of IoT today we think of small devices that monitor the house, stream radio, and check how burnt my toast is. However, with it being May the fourth we can talk about projects that are in the spirit of the day.

First over on the website hackernoon.com, is an article about various challenges in building and IoT devices that were made, Droid Translator Helmets which will pick up the speaker’s voice and translate the speech into beeps and buzzes, a Death Star Clock, a Force detector, and others. While there is an article over on makezine.com on building an R2-D2. After building the R2-D2 unit, one can easily make it better with a bit of work and a Raspberry Pi.


References

Are You an IoT Jedi? Create Your Own Star Wars Inspired Tech. (2017, 12 15). Retrieved from Hackrnoon.com: https://hackernoon.com/are-you-an-iot-jedi-create-your-own-star-wars-inspired-tech-4c36ce8d4535

Gentile, P. (2016, March 7). The Comprehensive Guide to Building a Realistic R2-D2 Replica. Retrieved from Makezine.com: https://makezine.com/projects/building-your-first-r2/

Wednesday, May 2, 2018

Using IoT devices for IDS applications Cont...

About a month ago I started describing the the process to use a Raspberry Pi device as an IDS. Now I continue with the process.

From this base of the installed and updated OS, to install the following applications Snort, Barnyard2, PulledPork, and WebSnort the project followed the following instructions and used the Snorter installation script that is available at the following site: https://github.com/joanbono/Snorter. Once this process was completed and configured the NIDS completed and functional. Another application that can be installed is Kismet. While an explanation of the installed applications will be listed in the project results section.

Another application that was installed was the remote desktop application, XRDP. This application which will allow remote access should it be necessary to the RPZW. However, during configuration use of the remote desktop often delayed or hampered with the downloading of application packages.

By following the installation processes on the various pages, installation of the software should fairly simple to complete.

    Listing of Sites used for the installation processes:
  • https://docs.kali.org/introduction/download-official-kali-linux-images
  • https://etcher.io/
  • https://whitedome.com.au/re4son/kali-pi/#swap
  • https://www.raspberrypi.org/downloads/.
  • https://whitedome.com.au/re4son/re4son-kernel/
  • https://docs.kali.org/general-use/kali-linux-sources-list-repositories
  • https://github.com/joanbono/Snorter

Due to the non-standard configuration of a RPZW computer system and that this project was conducted on a highly compressed time-cycle certain items. In configuration of the RPZW as a NIDS the project found that the initial off the shelf configuration of the RPZW required an additional Wi-Fi connector known as a USB “On the Go” adapter, while the OS footprint and the installation of the applications required at least a 16 GBs of disk space. In consideration of the limitations the project was a success.

The project group noted some benefits to the use of the particular OS, as the Kali Linux derivative is designed as a Penetration Testing Linux for those specializing in network security evaluations. Due to this specific intention of the distribution the project has developed a standalone tool that can provide a complete evaluation of network security. This project installed successful for use the following applications Snort, BarnYard2, WebSnort, Pulled Pork and Kismet as well as from the default installation Wireshark, a short summary of the applications is below.

Snort is as the snort.org web-page documentation states “is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks.” In the use of Snort we can monitor and detect network attacks when they are active in the network

BarnYard2 is an application that is deployed to translate the output of Snort. It is used by other applications to provide a translation service to understand the output of Snort.

PulledPork is a set of rules for usage in Snort they are provided by maintainers of Snort. The maintainers of the Snort application provide a public, a private version and a paid access version of these rule sets. The usage of the predefined ruleset provides an efficient method of automating the detection of network issues.

WebSnort is a browser based interface for displaying the output of what is referred to as a pcap file. Pcap files are the generated output produced by Snort. During analyst of Snort output WebSnort can manipulate the output files.

Wireshark is an application that be used monitor network protocols. While running Wireshark, the project can monitor the data packets traversing the network. This application can provide information on not only the packet header, but can be used to reconstruct the actual webpages that have been transferred across the network.

Kismet is used as wireless network detector, sniffer and an IDS application in itself. This application can itself work as the IDS over a wi-fi network. Similar to Wireshark and Snort it too needs the Wi-Fi chipset to allow for promiscuous mode. The application is passive in nature of its monitoring of the network. Kismet can provide a survey report for the Wi-Fi networks in the area.

Wrapping this up

The project’s efforts were focused on developing a NIDS that can serve the administrators or owners of the host network as a method of notification if there is unwelcome traffic, with the additional goals of maintaining a low entry point cost and providing efficient utilization or minimum use of power for the device, as well as providing documentation for the process.

Developed by the project efforts, was a RPZW device that is capable of using a host of applications to provide for the monitoring of the network. Installed on the device was several programs used to enable monitoring of a network. The applications included Snort, Kismet, WireShark, WebSnort, PulledPork, and BarnYard2. While all these applications alone can provide for a suitable monitoring of a network, combined these utilities offer a comprehensive ability to monitor a network.

Low cost efforts of the project can be maintained. All applications including the operating system are available as opensource software. Additionally, the device itself the RPZW was purchased for ten dollars, and accessories were available for an additional few dollars more. To further emphasize cost saving we can stress that this device also consumes very little power when in operation. The final goal of the project was to provide documentation as reference on how to replicate this endeavor. The project respectfully submits this document as that documentation. Efforts of the group within this document have been recorded.

Network monitoring tools are often thought of after an issue has been discovered. The ability for one to ensure that the network is uncompromised so that the information, passwords, credit card and other private information that is sent over that network remains confidential is also only valued after evidence that the network has been compromised is discovered. As a result, the value of a passive NIDS to monitor the network should be considered as valuable as the information that is available on that network. Likewise, the usefulness of the NIDS to monitor the network would only be noted after the network has been compromised.

As the project proceeded, the group must say that the project was not without issues. As a group, we managed to successfully overcome the issues as they arose. This project suffered from various issues from logistical, to configuration issues of the appliance.

One of the initial issues the project suffered from was the specialized hardware. Notably the as it is termed “USB On the Go” connector. This micro USB male to Female USB cable or adapter was initially ordered at the same time as the original RPZW. The first cable ordered was only arrived on July 19th, after being promised the standard 5-day delivery. After the arrival of other adapters made for the RPZW, a different “USB On the Go” cable adapter was ordered and arrived as promised two days later. While awaiting cables the group project used the time by writing disk images of various operating systems on to several micro SD cards.

Once all the cables arrived the RPZW was assembled, a second issue was discovered. This issue was the originally purchased RPZW was not operational. This was confirmed by using the a few of the already imaged micro SD cards successfully in another known good Raspberry Pi. Once this was discovered as a problem the device was returned to the store and exchanged for a working unit.

One issue was with the unfamiliarity of the group with initial RPZW, as with some distributions on with Raspberry Pi the installation can be completed on the slightly larger Raspberry PI 3b, which is 64-bit, the Micro SD card with the installed and configured OS could be simply transferred and updated on the RPZW. An initial selection of OpenSUSE as the OS was in error as that distribution no longer supports 32-bit hardware. Eventually, it was determined that a modified version of Kali Linux can be used on the RPZW and was installed on the RPZW.

The final issue encountered was during the first installation of the software. The first installation of the OS and supporting application was made on an 8 GB micro SD. After installation and upgrading of the base applications, the project suffered from a lack of space on the flash memory card. A larger 16 GB flash memory card was used and the installation of all applications was completed.

A small amount of changes would be made if the project was to be repeated by this group. First, on the ordering of parts, the group recommends ordering from vendors that are local or if the vendor has policies in place to guarantee prompt delivery of the ordered items. Another change would be that we start off with larger 16 GB micro SD cards rather than the smaller 8 GB.

Despite the issues that the project encountered during the effort. With the development of the NIDS system on the RPZW, the next step would be to install a one of the GUI interfaces Snort. One of the interfaces that can be evaluated is BASE, or Basic Analysis and Security Engine. Further another IDS service is Bro that could be installed as a comparative product. In using the RPZW as a test bed for various configurations could provide a solution to installations on more expensive hardware.

In closing there are still other opensource applications left to investigate their usefulness. However, the project was completed with the initial NIDS installed for monitor a wireless network. During the project, the group worked together to accomplish the goals, and succeeding to build a NIDS for monitoring Wi-Fi networks. Issues were overcome and dealt with as they arose. In closing this was the end of a successful project.

List o references used to build upon.

a list of references....

Here is a listing of references for the IDS project..
    References
  • 1.      Abbasi, A., Zahedi, F. “., Zeng, D., Chen, Y., Chen, H., & Nunamaker, J. F. (n.d.).
  • 2.       Advanced Threat Protection Buyer's Guide. (2016, 5 10). Computer Weekly, pp. p1-18. 18p.
  • 3.       Ashish Malik, A. K. (2015). A Comparative Analysis of Network Topologies in Wired Network. IUP Journal of Telecommunications Vol 7 Issue 4, p7-15.
  • 4.       BarnYard2. (2017, July 21). Retrieved from http://www.forensicswiki.org/wiki/Barnyard2: http://www.forensicswiki.org/wiki/Barnyard2
  • 5.       GFI Software. (2017, 6 18). Security Threats: A guide for small and Medium businesses. Retrieved from www.gfi.com: www.gfi.com/whitepapers/security_threats_SMBs.pdf
  • 6.       Gupta, A., & Zhdanov, D. (2012). GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE. MIS Quarterly, p1109-A7. 29p.
  • 7.       Hassen Sallay, S. B. (2015). Intrusion detection alert management for high-speed networks: current researches and applications. John Wiley & Sons, Ltd.
  • 8.       https://websnort.readthedocs.io/en/latest/. (2017, July 23). Retrieved from https://websnort.readthedocs.io/en/latest/: https://websnort.readthedocs.io/en/latest/
  • 9.       Internal Segmentation Firewall. (2016, 5 10). Computer Weekly, pp. p1-12, 12p.
  • 10.   Jr., G. S., Goyal, S., & Singh, G. (2014). Intrusion Detection Using Network Monitoring Tools. The IUP Journal of Computer Sciences, Vol. IX, No. 4,, pg. 45-58.
  • 11.   Kismet Wireless. (2017, July 21). Retrieved from https://www.kismetwireless.net/: https://www.kismetwireless.net/
  • 12.   Lazarevic, A., Kumar, V., & Srivastava, J. (2005). Intrusion Detection: A Survey. In A. Lazarevic, V. Kumar, & J. Srivastava, Managing Cyber Threats: Issues, Approaches, and Challenges (pp. 19-78). Boston, Ma: Springer US.
  • 13.   McNab, C. (2008). Network Security Assesment, Edited by Tatiana Apandi; 2nd ed. Sebastopol: O'Reilly Media.
  • 14.   Mohammad Sazzadul Hoque, M. A. (2012). An Implementation of Intrusion Detection System Using Genetic Algorithm. International Journal of Network Security & Its Applications, Volume 4, Number 2, pages 109-120.
  • 15.   Obaidat, M. a. (2007). Security of e-Systems and Computer Networks. New York: Cambridge University Press.
  • 16.   Perez, A. (2014). Network Security. London, [England]; Hoboken, New Jersey;: ISTE Limited : John Wiley & Sons.
  • 17.   Pfleeger, C. a. (2007). Security In Computing. 4th Ed. Boston: Pearson Education, Inc.
  • 18.   Raspbery Pi Foundation. (2017, Febuary 1). Introducing the Raspberry Pi Zero W. Retrieved from raspberrypi.org: https://www.raspberrypi.org/magpi/pi-zero-w/
  • 19.   Rouse, M. (2014, 11 1). http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA. Retrieved from http://whatis.techtarget.com: http://whatis.techtarget.com
  • 20.   Schifreen, R. (2006). Defeating the Hacker: A Non-Technical Guide to IT Security. West Sussex: John Wiley & Sons.
  • 21.   Securing Your Network and Application Infrastructure. (2016, 5 10). Computer Weekly, pp. p2-62, 63p.
  • 22.   Snort. (2017, July 23). Retrieved from https://www.snort.org/: https://www.snort.org/
  • 23.   Snort FAQ. (2017, July 23). Retrieved from snort.org: https://www.snort.org/faq/what-is-snort
  • 24.   Steinberg, J. (2015). Official (ISC)2 Guide to the CICCP-ISSP CBK. 2nd ed. Boca Raton: Taylor & Francis Group, LLC.
  • 25.   Syed, M. R., & Kar, D. C. (2011). Network Security, Administration, and Management : Advancing Technology and Practice. Hershey Pa: IGI Global.
  • 26.   Timofte, J. (2008). Intrusion Detection using Open Source Tools. Revista Informatica Economică , 75-79.
  • 27.   Vacca, J. R. (2014). Network and System Security. Amsterdam: Syngress.
  • 28.   Wang, C. &. (2007). Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats. Hoboken: Wiley.
  • 29.   WireShark.org. (2017, July 23). Retrieved from WireShark.org: https://www.wireshark.org/

Wednesday, April 18, 2018

Image result for internet of things

Internet of Things - Pros and Cons

Like everything else, the Internet of Things has both good qualities and bad qualities. 

At a first glance, it looks almost foolproof; what could be wrong with being able to connect to everything just from your phone? An IoT user will be getting a lot of things out this. They will be able to better secure their house; they will be able to monitor just about anything in their house (kids, temperature, etc...) by using an app most, smart vehicles will make traveling and commuting safer, manufacturing will be improved significantly, and many other benefits.

All these good things come at a price though. The Internet of Things is facing some security challenges. All the existing security issues that come with the internet and mobile devices are added to the new list of issues that come with the IoT. Data loss and data theft are at the top of the list. If a hacker were to ever gain access to one of the devices on your IoT network, your data would be compromised. They would have access to anything and everything that is correctly connected to that specific network. The more devices on the IoT network, the greater the probability is of a hacker gaining access.

Every application needs to be updated every now and then. Most updates are minor things or security updates. We all know that with every update comes a new set of issues, especially in a big application (a POS system for example). While the updates are meant to fix a lot of things, they also invite all sorts of new problems. With IoT, the constant updating will bring newer and newer security risks while attempting to fix the previous ones.

Final Verdict?

I personally would like to see where IoT is going. It's definitely a good idea but I don't know if I would risk my personal information just to be able to control everything I own from my phone. I'm not one for losing things, but if I ever lost my phone or whatever I use to keep up with my IoT devices, I would be at a loss. Depending on who found my device, my network could potentially be at risk and in today's world that is not a good thing. I'll stick with what we have now and wait to see where IoT is going.

Saturday, March 31, 2018

Using IoT devices for IDS applications

During the summer of 2017, I investigated the use of IoT devices and their usefulness towards the application as a Network Intrusion Detection device. The group looked into the usefulness of the Raspberry Pi Zero W which would lend itself as a wireless intrusion device. This was a great experience in developing IoT devices. Due to the processor limitations the Raspberry Pi Zero W are perhaps the most limiting aspect of the RPZW for this application. The RPZW as a completely headless unit, with no intention of accessing the computer while relying on the configuration to provide notifications may be acceptable but if available try utilizing the 64-bit processor on that is implemented in the Raspberry Pi 3 Model B. Further, if one was to upgrade to the Raspberry Pi 3 model B one could still see a cost savings in comparison to the use of a standard off the shelf solution to an IDS.

In order to assemble the Raspberry Pi as an IDS first the acquisition of the memory card. For data storage Raspberry Pi’s utilize Micro SD cards, and due to the OS storage requirements a 16GB or larger drive is required. However, it is also noted that the 32GB solutions have been reported to be unstable over longer periods of time.


Writing the OS to the Raspberry Pi.

To install an OS onto the micro SD card one needs to download the image of the OS from the selected vendor in the case of this project that was downloaded from the Kali Linux site; https://docs.kali.org/introduction/download-official-kali-linux-images. Once the download has completed, with a windows computer one can use either one of the following two programs to write the image to the micro SD card, Etcher, or Win32DiskImager. Etcher is available from the following website: https://etcher.io/ and Win32DiskImager is available at: https://www.raspberrypi.org/downloads/. Once the image is written to the micro SD card one can install the card into the micro SD card on the RPZW.


Upgrading the Kali base

The original summer development of the IDS Raspberry Pi was dependent on instruction provided at the following blog site: https://whitedome.com.au/re4son/kali-pi/#swap. Also, of note the same individual provides a revision the Linux kernel that enables both Bluetooth and Wi-Fi connections this is modified kernel is available at: https://whitedome.com.au/re4son/re4son-kernel/. Once the device is booted and the user has logged on it is recommended that the Kali repositories be updated from a list of Kali repositories. Repositories can be located at this location https://docs.kali.org/general-use/kali-linux-sources-list-repositories.

Utilizing the Entire Storage Drive.

To install a graphical interface to expand the storage space execute the command “apt-get install gparted” the distro will quickly download and install the application. In the project, the storage space was expanded to use the full drive. Another modification to the base install provided was the swap file we enabled a recommended 1M swap file.

Updating the OS

To update the distribution package list, and upgrade the installed applications, to perform this the commands are “apt-get upgrade, and apt-get upgrade, they however can be combined as: “apt-get update && apt-get upgrade”. This will cause the computer to check for and install new versions of any installed applications that have newer versions available.

Listing of Sites used for the installation processes:
https://docs.kali.org/introduction/download-official-kali-linux-images
https://etcher.io/
https://whitedome.com.au/re4son/kali-pi/#swap
https://www.raspberrypi.org/downloads/
https://whitedome.com.au/re4son/re4son-kernel/
https://docs.kali.org/general-use/kali-linux-sources-list-repositories
https://github.com/joanbono/Snorter

Next time - Installation of software on the Raspberry Pi IDS.

References

1.      Abbasi, A., Zahedi, F. “., Zeng, D., Chen, Y., Chen, H., & Nunamaker, J. F. (n.d.).
2.       Advanced Threat Protection Buyer's Guide. (2016, 5 10). Computer Weekly, pp. p1-18. 18p.
3.       Ashish Malik, A. K. (2015). A Comparative Analysis of Network Topologies in Wired Network. IUP Journal of Telecommunications Vol 7 Issue 4, p7-15.
4.       BarnYard2. (2017, July 21). Retrieved from http://www.forensicswiki.org/wiki/Barnyard2: http://www.forensicswiki.org/wiki/Barnyard2
5.       GFI Software. (2017, 6 18). Security Threats: A guide for small and Medium businesses. Retrieved from www.gfi.com: www.gfi.com/whitepapers/security_threats_SMBs.pdf
6.       Gupta, A., & Zhdanov, D. (2012). GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE. MIS Quarterly, p1109-A7. 29p.
7.       Hassen Sallay, S. B. (2015). Intrusion detection alert management for high-speed networks: current researches and applications. John Wiley & Sons, Ltd.
8.       https://websnort.readthedocs.io/en/latest/. (2017, July 23). Retrieved from https://websnort.readthedocs.io/en/latest/: https://websnort.readthedocs.io/en/latest/
9.       Internal Segmentation Firewall. (2016, 5 10). Computer Weekly, pp. p1-12, 12p.
10.   Jr., G. S., Goyal, S., & Singh, G. (2014). Intrusion Detection Using Network Monitoring Tools. The IUP Journal of Computer Sciences, Vol. IX, No. 4,, pg. 45-58.
11.   Kismet Wireless. (2017, July 21). Retrieved from https://www.kismetwireless.net/: https://www.kismetwireless.net/
12.   Lazarevic, A., Kumar, V., & Srivastava, J. (2005). Intrusion Detection: A Survey. In A. Lazarevic, V. Kumar, & J. Srivastava, Managing Cyber Threats: Issues, Approaches, and Challenges (pp. 19-78). Boston, Ma: Springer US.
13.   McNab, C. (2008). Network Security Assesment, Edited by Tatiana Apandi; 2nd ed. Sebastopol: O'Reilly Media.
14.   Mohammad Sazzadul Hoque, M. A. (2012). An Implementation of Intrusion Detection System Using Genetic Algorithm. International Journal of Network Security & Its Applications, Volume 4, Number 2, pages 109-120.
15.   Obaidat, M. a. (2007). Security of e-Systems and Computer Networks. New York: Cambridge University Press.
16.   Perez, A. (2014). Network Security. London, [England]; Hoboken, New Jersey;: ISTE Limited : John Wiley & Sons.
17.   Pfleeger, C. a. (2007). Security In Computing. 4th Ed. Boston: Pearson Education, Inc.
18.   Raspbery Pi Foundation. (2017, Febuary 1). Introducing the Raspberry Pi Zero W. Retrieved from raspberrypi.org: https://www.raspberrypi.org/magpi/pi-zero-w/
19.   Rouse, M. (2014, 11 1). http://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA. Retrieved from http://whatis.techtarget.com: http://whatis.techtarget.com
20.   Schifreen, R. (2006). Defeating the Hacker: A Non-Technical Guide to IT Security. West Sussex: John Wiley & Sons.
21.   Securing Your Network and Application Infrastructure. (2016, 5 10). Computer Weekly, pp. p2-62, 63p.
22.   Snort. (2017, July 23). Retrieved from https://www.snort.org/: https://www.snort.org/
23.   Snort FAQ. (2017, July 23). Retrieved from snort.org: https://www.snort.org/faq/what-is-snort
24.   Steinberg, J. (2015). Official (ISC)2 Guide to the CICCP-ISSP CBK. 2nd ed. Boca Raton: Taylor & Francis Group, LLC.
25.   Syed, M. R., & Kar, D. C. (2011). Network Security, Administration, and Management : Advancing Technology and Practice. Hershey Pa: IGI Global.
26.   Timofte, J. (2008). Intrusion Detection using Open Source Tools. Revista Informatica Economică , 75-79.
27.   Vacca, J. R. (2014). Network and System Security. Amsterdam: Syngress.
28.   Wang, C. &. (2007). Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats. Hoboken: Wiley.
29.   WireShark.org. (2017, July 23). Retrieved from WireShark.org: https://www.wireshark.org/

Monday, March 12, 2018

The Internet of Things

    The Internet of Things is a wide-ranging subject matter, it composes of new devices that range from sensors to smart interfaces for cars, household items and computers. The methods and means that compose these items and enable them to join us on the internet are a new class of computers. These computers are having been referred to as postage stamp computers, micro-computers and other names.

    Several makers produce these micro-computers and a quick search of the internet one can identify many of these devices and provide reviews as to the serviceability of their use. The flagship brand of these computers is the Raspberry Pi Foundation, which offer these single board computers with the names of Raspberry Pi; Model B, Model A, Pi 3, Compute Module, Zero, and Zero W.

    Each of these versions come with their own features, and well shapes. The latest Pi 3 Model B for instance is a 64-bit, Quad core computer that runs at 1.2 Ghz. While the Raspberry Pi Zeros are using the 32-bit, one core, running at 1 Ghz.

    Operating systems, the Pi’s do not come as a normal desktop computer preloaded with an operating system. Due to this one needs to use the available instructions from the Raspberry PI foundation or utilize other websites for instructions on installation of the operating systems. Note since the Pi Zero group is 32 bit only they only support 32 bit operating systems, while the Model 3 with a 64 bit can support the 64 bit OS as well.

Friday, February 23, 2018


      The internet is growing again, and now it is not just add just standard users. Now, being added to the internet is our things.  According to Forbes magazine in a 2014 article by 2020 the internet is expected to have over 26 billion connected devices.  This means that many things will be coming to the internet already we have refrigerators, toasters, doorbells, and thermostats.  Not only these things but new postage stamp computers like the Raspberry Pi and the intel Edison.
     When it comes to how these devices will operate we are looking at various old and new operating systems.  For many systems the operating systems we know can be brought onto these devices, many flavors of Linux are now being used as well as other Unix OS.  Microsoft has even released their own entry with Microsoft’s Internet of Things.
    Another thing we will be looking at is security and the steps involved in the internet of things environment.  Looking into and discussing implementations of security and other issues affecting this web of things.   What issues in security are affecting devices within the IoT environment and how they are being dealt with.
     Further, we’ll look at other sites and discuss what Is being discussed on those sites.
     Again, welcome to the group blog and enjoy the ride.

Subscribe in a reader