Asking Good Questions

Asking good questions is important when analyzing data. Thats not easy when you have no motivation to find something specific, like statistics from last sales to improve your profit in next one.

Environment: ASUS ROG G55VW, Xubuntu 18.04, Anaconda, Python 3.7. Using Jupyter-notebook.

Our teacher had a CSV file to play with. http://taanila.fi/employee.csv

It has a lot of information but I’m interested in people who travels for business frequently. How old are they, is it men or females who travels more, marital status, job satisfaction and stuff like that. Continue reading

Project for Information Security Course: Simulating Internet In Packet Tracer

Simulating Internet

By simulating Internet I mean creating a cloud which represents the action made by ISPs and other devices along the path to remote network’s target device. Continue reading

Project for Information Security Course: Connecting Devices and Configuring DHCP server

17.10.2018

Getting started

I thought that it would be important first step to plan the addressing scheme. I segmented every department in their own VLAN and every VLAN has it’s own host range. For getting known a little better with subnetting math, I didn’t assign easiest /24 bit masks for every subnet. For sake of complexity and training, subnets has /25, /26 or /30 bit long masks. Continue reading

Project for Information Security Course: Designing The Topology part 2

16.10.2018 22:32

Before we’re starting to actually even do anything, I have been thinking about the network’s core structure. I want to separate every department, but is it necessary to give every segment it’s own router? It seems to be costly, a lot of work to configure and maintain. What if we just put two layer 3 switches in middle of everything? Continue reading

Project for Information Security Course: Designing The Topology

Planning  the project

As a part of our Information Security Course in Haaga-Helia, we are going to implement a working topology in Cisco Packet Tracer software. We are working in group of three students.  As it is Information Security Course, our goal is to accomplish secure and fully working network. Continue reading