WK7 Digital Media Design_Where can you turn for help?

The three posts I have found I have actually used recently that were helpful. It is a video on YouTube about how to find all files that contain a specific image in InDesign, the second is a forum on the adobe page about blending images in photoshop and the last is about creating gradients in Illustrator.

  • The information I have found is fairly current for what it is. The video about InDesign was uploaded on October 20, 2020, forum on combining images in photoshop was last published on May 21, 2020 and the forum on creating gradients in Illustrator was published on April 2, 2019
  • The video was uploaded by a channel named InDesignSecrets, the blending forum and the gradient forums were uploaded by the companies themselves. They are an authority on the matters. I can tell because they all seem to be uploaded by the original creators.
  • As far as gatekeeping mechanisms go, the forums have editors that seem to update the information quite often while as the video has a like/dislike rating with the likes being more than the dislikes indicating that the information is accurate.
  • The information is well written and concise. The video shows you step by step on how to do the operation while the forums have images that walk you through step by step on how to complete the operation.
  • As far as this being information I might use in the future, probably not mostly because I have learned what they were trying to teach me. Would I recommend it to someone who has a similar issue? of course.
  • links to videos and forums; how to find files that contain a specific imagehow to create gradientshow to blend images

WK8 Midterm Research Project_Privacy, Security, Hacks, and Leaks

1.) The top 5 biggest threats to restaurants are hackers, POS malware, ransomware, inside threats and Wi-Fi security.

When it comes to hackers, these highly skilled computer experts use their knowledge to exploit or break into connected devices and computer systems. They target restaurants due to the abundance of poorly secured systems. Once they find a vulnerability and get into the network, they go after the POS systems. Due to the POS doing the simple job of processing transactions, the typical alarm bells of a desktop computer hack would not be seen by a user, for example, ransomware messages, degraded performance, etc.

With POS malware it is quite simple, sometimes malware will discreetly slip by antivirus programs and then stealthily extract payment data, despite the presence of traditional firewalls. From there, it can extract stolen data slowly, making it look like normal traffic. Weeks or months could go by and by then, who knows how many customer credit cards have been breached?

Ransomware is an interesting one. Imagine logging into your back-office system only to be greeted with a frozen screen. You cannot access your files and then see a ransomware message: Pay $15,000 to access encrypted files. There’s nothing that can be done at that point. Ransomware prevents users from accessing their system until a ransom is paid to get a decryption key of some kind. Ransomware attacks are difficult to track down and have almost no way of getting around them.

Whether it’s an honest mistake or a disgruntled employee, inside threats account for about 50 percent of all security incidents. An inside threat can range from someone intentionally installing malicious software to accidentally opening an email that they believed was the real deal only to find out that they have compromised their entire network. It’s nearly impossible to stop this from occurring, but with the right managed security in place, it can be thwarted or caught before real damage is done.

Securing your Wi-Fi with firewalls and ensuring cellular backup from downtime will protect cashflow, your own restaurant’s security, and patrons’ security. Having separate Wi-Fi access points for patrons versus the POS and business network is crucial. You can lose connection at any time and lost connection means lost business. Having a backup cellular option in place is easy, affordable, and imperative. Especially in todays time. Many restaurant owners set up a firewall as a basic security measure and believe their networks will be sufficiently protected. In today’s cyber world, firewalls can’t just be set up and run on their own. While a network firewall is a fundamental security component, it must be actively monitored, managed, and updated to be effective. Even still, a managed firewall cannot defend every threat. Attack and breach prevention requires a new approach, and many products and service providers simply do not have the ability to stop cybercriminals before they do legitimate damage.

Know yourself: Identify at least 5 digital processes, systems, and/or functions your company has in place. Importantly, address how could those be exploited or manipulated in order to gain access to valuable corporate or customer data?

The five processes my company has in place are VPN’s, Firewalls, encrypted passwords, secured wifi networks and backup cellular options.

VPN’s can be manipulated by hackers by either breaking the encryption through known vulnerabilities or steal the key through unethical means. Hacking a VPN is far harder than just stealing the key. Because VPN’s run very complex mathematical computations it would require powerful computers and up to years of hacking to crack which is why hackers try to just steal the key.

To put it simply, a firewall with DPI (deep packet inspection) which is an advanced method of examining and managing network traffic, will inspect all of the data packets entering and leaving your network to check for malicious code, malware, and other network security threats. Encrypted injection attacks are usually delivered via phishing emails. To get around the firewall, attackers direct emails to specific targets within the network with the intention of tricking a user into accessing the email, which then gives them entry. Alternatively, they can attack public IP addresses found on a server to update their C&C (command and control) systems.

When it comes to hacking passwords we must understand how passwords work in the first place. When you make a password it’s obviously best to make one that you will remember. However, making a password you will remember and that will be secure are two different things that must coincide for a secured experience. Most people when creating a password don’t consider how safe that password might actually be. Some do the traditional 123456 or “password” as their password but that’s exactly how hackers get you. One of the most common ways of hacking passwords is by using a technique called Password Spraying which is a technique that attempts to use a list of commonly used passwords against a user account name, such as 123456password1231qaz2wsxletmeinbatman and others. Once we have established a secure password we must then encrypt it. Not all passwords are encrypted. Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt, the information. Hackers can use advanced algorithms to counteract the encryption and extract the passwords.

Secured wifi networks are a must for anyone not just organizations and business. When a wifi network is hacked, hackers can obtain your location, IP address and your internet traffic. With that information hackers can use that to exploit users information that are connected to your wifi network and steal their information as well. This information can be used as ransom or can be sold to the black market.

Cellular backup options can be harder to hack than wifi because of the vast array of firewalls that are in place but when a hack is made on a cellular backup it is mostly because of software update issues and the company that is providing it. Similar issues occur when it is hacked versus a wifi network.

Develop your strategy: As the chief technology executive, make 5 recommendations that your company should adopt to be more safe, secure, and reliable. Again, consider hardware, software, networks, and human policies and procedures. (e.g., appropriate use policy on corporate computers; firewall; SSL/web encryption; backup/retention)

Five recommendations I would make are to 1.) insure that employees are trained in spotting out phishing emails and understand the consequences of falling prey to them. 2.) Have the latest and most up to date software security methods so that the company is always ready to defend itself against malicious wrong doers. 3.) Input security protocols that protect customers from hackers by making sure we use VPN’s in our networks and have separate network channels for both company use and public. 4.) Insure that we have backup cellular options incase anything were to happen to our network. And finally, limit access to company computers to managers and supervisors as to avoid in house hacking issues.

WK12 Mobile apps blog post

The two popular mobile apps I will be discussing are actually the number one and two trending apps in the app store right now. The first being TikTok and the second being YouTube.

TikTok is an app that is used to make videos for entertainment that last at most 60 seconds. It’s based off of the once popular app Vine that had a similar premise and structure. According to Hootsuite TikTok has a reputation for being popular with teens. 27% of its users are between 13-17 years old. But internal data from March 2019 shows that its largest age demographic (42%) is the young adult crowd. Combined, the 13-24-year-old segments reps 69% of the app’s user base. As far as revenue streams go its highly dependent on how many followers you have but according to influencermarketinghub.com Until TikTok’s advertising network develops further, the easiest way for TikTok influencers to earn money is by making direct arrangements with brands. As people become better known on the platform, they will begin to have brands approach them with business propositions. Once you count your followers in the thousands, you can start to look at monetizing TikTok. Companies have been known to pay $200 to $20,000 per branded video promoted by influencers, depending on the individual’s level of influence. I have never personally posted anything to TikTok but I have scrolled through occasionally when I would get bored so therefore I have no tips or tricks to getting the most out of the app.

YouTube is an app for both content creators and general users to stream videos of their liking. According Sproutsocial.com YouTube is the perfect platform for reaching a teenage and young adult audience, as 81% of US internet users aged between 15 and 25 are using the platform. Interestingly, YouTube is popular across other age groups as well. As far as how much you can make as a YouTuber turbo.intuit.com says  you can make anywhere between $0.01 to $0.03 per view, which translates to $3-$5 per 1000 views, and up to $5,000 for 1,000,000 views. YouTube income is generated by advertisements through AdSense, sponsorships with popular brands, and affiliate links. As an avid user of YouTube, one tip I can give to those looking to get the most out of the app, if you find a youtuber you enjoy watching make sure to turn on notifications so that you are alerted when they upload a video. Also, if you are looking to buy something make sure to look up reviews on the product first through YouTube because not only will you gain more knowledge on what you’re purchasing but you may also find discount codes.

 

 

WK9 Cybersecurity Blog Post

For my blog post this week as I was doing research I found some more recent news that actually took place on Oct 21, 2020. According to nbcnews.com Washington post stated “A cybersecurity company says it has found a hacker selling personally identifying information of more than 200 million Americans, including the voter registration data of 186 million.” Trustwave, a global cybersecurity company has stated that as it was monitoring the dark web forums for threat information, it came across a hacker calling his/her self Greenmoon2019. No financial loss or damage has been reported as of yet nor was there any word on an arrest of any kind however Trustwave has stated “We are committed to finding and investigating fraud during this election. While we cannot comment on information we may or may not have received from the public, we want to assure the American people the FBI is closely coordinated with our federal, state, and local partners to safeguard our voting processes.”

The biggest lesson we have learned from this is that we almost are never truly secured online. Whether we like it or not technology will continue to expand and new threats will continue to appear. The best and only thing we can do to prevent ourselves from becoming victimized as much as we can are the basics; use a VPN, install antivirus, and educate ourselves on how to prevent ourselves from falling victim to these attacks. Some things are out of our hands but if we all do our part in protecting ourselves, cyber security won’t be an issue.

WK6 Content Management Systems Blog Post

Content Management Systems are software programs that are used to manage the creation and modification of digital content. While they are used to create websites they can also be used for things such as ecommerce and remote linking to make updates from anywhere in the world. Most content management systems are pretty flexible nowadays. While there are some that focus on a specific uses most of the popular content management systems can be used to create essentially any type of website.

Building a website using a CMS vs coding it by hand are two different worlds. For one a CMS can be used by pretty much anyone and does not require much knowledge if any of coding at all. It keeps costs down by not having to pay someone to code and keep the webpage up to date while also giving the user quite a bit of different style options and choices on how they want their webpage to look. The biggest drawback is that you are limited by the preset styles, colors etc that the program provides so you get what you get when it comes to building your site.

Coding a webpage by hand requires a lot of knowledge on different types of languages and techniques to be efficient. Coding a website allows you to make the website exactly how you want it. You get to choose everything from the font style to the color of the page down to the value. The biggest drawback to coding by hand is that you have to learn the languages and how they coincide with each other. To code a website not just entirely but efficiently as well requires a lot of knowledge and effort to become good at it. When it comes to what the best current practices are to making a website it really just comes down to what is it that you envision. You must have at least an idea as to what you want your site to be about or look like before you start dabbling at the coding process of it.

CMS’s impact the web design industry in both a positive and negative way. For one, it is getting more and more people interested in coding which is always a plus while simultaneously giving industries a reason to not hire someone to do it for them. Despite what I just said I do not believe it is taking away jobs from web developers. While yes CMS’s are fairly easy to use and cheap not many companies go that route because of their limitations. Sometimes it is just easier to employ someone to do it for you so that it comes out exactly how you want it.

WK10 The Cloud – Cloud services review

The two cloud base applications and services I use are google drive and the Adobe Creative cloud. Google Drive is an online service that allows you to store files of any kind for safe keeping. Adobe creative cloud allows you to not only store the files and projects you were working on but also allows you to access your applications and projects from anywhere in the world because it will all link to an account. Google Drive would work as efficiently if it were not in the cloud the whole purpose of Google Drive is to be able to share your work with others and save it for future use. The cloud based system it utilizes allows you to access your files from anywhere you can log into it from. Adobe Creative cloud on the other may work fine if it weren’t in the cloud. I just believe you will run into the same situation as you would with Google Drive. Advantages to having both in the cloud are what I was mentioning before where you are able to share your files amongst others with choice of either giving or not giving them access to edit or make changes as well as the ability to access your files from anywhere you have access to your accounts from. I do not have any privacy or security concerns at the moment while using either platform.

WK5 Understanding Social Media Demographics

1. What were the top three social media sites, in terms of traffic, in 2019-20? List them in order of popularity.

According to dreamgrow.com the top three social media sites of 2019 and 2020 are 1.) Facebook 2.)YouTube and 3.) Instagram.

2.) Provide a brief summary of how each social media site works and why people use it.

Facebook works by allowing people to stay connected with each other and post virtually anything they want to. People use Facebook to stay in touch with distant friends and family and to even catch up on news. YouTube works by allowing users to be creative and express themselves through videos that are then posted for the world to see. Most people use YouTube as a way to keep them entertained. I personally have stopped watching T.V. and started watching YouTuber’s for entertainment. Those who create videos are typically what are called Let’s Player’s who record themselves playing a popular video game while commentating over it. Instagram is one of those interesting forms of social media where anything goes. Unlike Facebook, Instagram is more geared towards imagery. The platform only allows you to post photos but that hasn’t stopped users from getting creative with what they post. Most of what is posted are what’s called memes which are funny, often relatable posts that implement photos and funny captions.

3. What are “demographics” and why is it important in social media?

According to sproutsocial.com User demographic statistics for any social media network are an essential piece of data for any marketing strategy. Just like how you want to know who uses your products and services, knowing who’s on what platform aids you in researching, advertising and marketing decisions. It is important in social media because you want to make sure that people within your ideal target audience are actually participating actively there. Social media demographics help you set up marketing personas and understand your audience in greater detail. If you’re looking to widen your audience, such as trying to reach Generation Z, you can use current demographic data to figure out which networks you can focus your content energy on.

4. Explain any demographics that stand out among the three social media sites you listed above. (More popular with a specific age group, are majority of users male or female, married or single, employees or self-employed, etc.)

According to sproutsocial.com 75% of its users are between the age of 18-24 and 57% of its users are between the ages of 25-30. While surprisingly 47% of its users are between the ages of 30-49.

5. On average, how much time do users spend on each social media site during a day, week or month? Provide a resource that supports your answer.

According to review42.com The average US adult spends 38 minutes per day on Facebook. 16-24 year olds spend a media of 3 hours a day on social media. broadbandsearch.net says that people on average spend 40 minutes a day watching YouTube videos while having over 30 million daily active users and over 1.5 billion monthly active users. BroadandSearch.net also says that people on average spend 53 minutes a day on Instagram while having about 500 million daily users and over 800 million monthly users.

6. Which of the three social media networks is growing the fastest? Why do you think that is?

According to x-cart.com Over the last few years, Instagram has evolved from a simple photo-sharing app into a powerful marketing tool. It’s considered to be the fastest-growing social media platform with the most engaged user base. I believe the reason why that is is because a lot of people use Instagram not just to post photos and gain likes but to also use it market products. As an Instagram user myself, over the past two years I have found that I am getting a lot more ads on products I have either never heard of before or ones that I have searched up on a different platform. Companies have that because most of Instagram’s users are teens and young adults it is easier and quicker to grow their business due to their large active user base.

7. How are the majority of visitors accessing these three sites (computer, mobile device, tablet)?

According to statista.com 98.3% of users access Facebook through any kind of mobile device while less than 1.7% access it through a laptop or desktop computer. According to thinkwithgoogle.com 3 in 4 adults report watching YouTube at home on their mobile devices. Since Instagram is only available for mobile devices, all of their users are on mobile.

Week 3 Research Assignment

1.) Today, do more people access the web using computers or mobile devices? Provide a resource that supports your answer.

I definitely believe more people access the web using mobile devices nowadays rather than from a computer for two big reasons as stated by BroadandSearch.net; mobile devices are much more accessible to people around the world especially in developing countries rather than desktops and with a lot of eCommerce businesses making it easier for mobile shoppers to get what they want with the development of apps and the constant tweaking of those apps to make sure users get the best experience they can receive from their favorite retail stores. With the rate at which online retailers are growing, the numbers and study shows that this will continue to climb and will be out future.

2.) Who controls the World Wide Web? What is it made up of?

According to www.w3.org The World Wide Web Consortium (W3C) is an international community where Member organizations, a full-time staff, and the public work together to develop Web standards. The Internet is made up of a massive network of specialized computers called routers. Each router’s job is to know how to move packets along from their source to their destination.

3.) Who is Tim Berners Lee? What is he best known for?

Tim Berners Lee is a Computer Scientist who was born in London, England who is best known for developing the World Wide Web. Sir Tim is the Director of the World Wide Web Consortium (W3C), a Web standards organization founded in 1994 which develops interoperable technologies (specifications, guidelines, software, and tools) to lead the Web to its full potential. He is also the Director of the World Wide Web Foundation which was launched in 2009 to coordinate efforts to further the potential of the Web to benefit humanity.

4.) What is a blog? What is it used for?

A blog is essentially an online journal or a website that displays information. According WWW.business2community.com the purpose of a blog is to aid marketing to a point where the content you deliver is targeted specifically to the wants and needs of your audience. Provide answers to their most commonly asked questions or provide advice to areas within your niche that your business is an expert on.

5.) What is a “responsive” website design?

A responsive website design is one that is designed so that it aligns itself properly when you access it with either a mobile device such as a phone or a tablet or a computer. A non responsive website design for example would be one that has not been approached with a mobile first design. One that is not mobile friendly.

6.) Why are “responsive” website designs necessary?

Responsive website designs necessary because as mentioned earlier, most users are accessing web pages from their mobile devices and if a web page is not responsive than it ruins the user experience for those accessing it. It will cause the images and anything on that web page to look too zoomed in and not properly coded.

7.) What is SEO, and why should website owners/managers be concerned with SEO?

SEO stands for Search Engine Optimization and its the process of optimizing your online content so that a search engine likes to show it as a top result for searches of a certain keyword. Website owners/managers should be concerned with SEO because if they have not optimized their website so that it comes up as the first option(s) on a web page when keywords are typed in than they may see a significant drop in user web traffic because it would then be lost in the abyss of millions of web pages.

8.) What is dynamic content?

According to barilliance.com Dynamic content is a web-page or email component that changes. Typically, changes are based on user signals that include in-session behavior, user data, and user-characteristics. In-session behavior adapt content based on what pages they visit, which products they add to cart, and how long they spend on site.

9.) What is a content management system? You work with one, what is it’s name?

A content management system (CMS) is an application that is used to manage web content, allowing multiple contributors to create, edit and publish. The one we work with is called WordPress.

10.) What is a youtube channel? Who might want to start one?

A YouTube channel is a place where all of your videos that you have either created or Favorited are stored. Anyone can start a YouTube channel but those who would want to be content creators to either create videos to inform or entertain others are the main group of people who start one.

Welcome to my first blog!

Hello all, My name is Faries Salama. I am 20 years old and am a third year college student, second year COTC student. I am a introvert through and through, I enjoy listening to music, watching YouTube videos and playing Overwatch when I get the chance. I work as a computer sales associate at a Best Buy and I got to say it is pretty cool. I used to manage a Taco Bell before that for a year and without a doubt Best Buy is far more enjoyable (and less frustrating) than Taco Bell. I don’t do much nowadays besides going to work and hanging with friends. This is my first blogging and honestly, I can see myself getting the hang of this. I can’t wait to get to know you all and work with you this semester.