Unit 23

Human Computer Interaction (HCI)

HCI is Human Computer Interaction that helps people to interact with devices such as phone, computer and tablets. All devices are different and have their own interface. There are companies that produce their own phones like Apple, Samsung and Google. Apple is completely different from Samsung and Google. Apple uses its own interface, iOS. It has different icons, settings and even browser. Apple is unique phone compare to Samsung and Google that uses the same software Android. It has its pros and cons. Android gives more freedom to the users, however, less protection as Apple. Apple gives better protection because it does not allow users to visit websites and download certain programs that are unknown to the software.

Development:

In the beginning, the technologies were very limited in the performance. There was an extremely small amount of memory that could be stored and processed. With time, they advanced, and devices can run thousands of times faster compared to previous versions. Technology became more efficient than they were before and keep increasing it. Nowadays, scientists and programmers do their work faster because the devices they use can run more complicated programs that give an answer fast and accurate.

Image result for first computer

Some programs are designed to assist developers. The programs have shortcuts for developers that saves a lot of time. The programs’ database increase and function can be called with a word. Example of a program like this is Sublime Text 3. The program can run many languages and has shortcuts for functions. The production of programs speeds up rapidly.

Image result for sublime text

Both platforms give a design that can be used by many people, no matter how different they are. The phones have options to use a design that is made for long-sighted people that cannot read small text. The text became bigger and easier to read. It was a very small example of what HCI can do.

Image result for android and apple interface

Graphical User Interface is what Android and Apple are. The interface that can be interacted by visual indicators such as icons and menus. Another example can be Microsoft Office Powerpoint when a user moves boxes around the screen to create a presentation. It can add slides and give to an object animation by a menu that is inputted to the program. Graphical User Interface makes programs easy in use which means more people can be involved in the production or developing new technology through the programs.

Image result for microsoft office powerpoint

Web User Interface is software that user can interact through mouse buttons, keyboards and display. An application will track and respond to a user after it will gain input. The example of the application can be a website, YouTube. The person will click on a video and it will send the user to a page where the video will play.

Image result for amazon website

Command Line Editor is a window where a user can interact with software through command lines. Through them, the user can open programs, reach files and find more information about an application. Linux operation system gives a lot of opportunities to use a command line editor.

Image result for Linux command line

3D interfaces are used to display more objects on a screen. The interfaces give more accurate information about objects and simulations. The scientists use 3D interface to learn more information about space or simulate future technologies that will help people. It is the third dimension space built in computers.

Image result for 3d interface

Many technologies based on voice recognition in nowadays. Technology such as Alexa uses voice recognition to assist people. It is an artificial intelligence that can understand people’s phrases and give a logical answer to them. Furthermore, voice recognition can be used for locks and in other security ways.

Image result for voice input

Thought input is a headset that can read the brain’s impulses and proceed with the input. People can interact with devices through their mind without using any devices like mouse, keyboard and controllers.

Image result for thought input

Virtual reality is a headset that covers eyes to bring a human into a reality that is built inside a computer. The computer can make a copy of a real world or simulation. For example, roller-coaster. It is an illusion for a brain that activates the same feelings that people feel on a real roller coaster.

Image result for 3d interface

Modern Application is a software that can run on all platforms. From phones to computers. Antiviruses, HTML5, applications and some games can be run on many other platforms. For example, the Google Chrome browser can be run on Samsung, MAC and even some TVs. It allowed people to reach their socials or files on any platform

Modern technologies trying to use fewer devices to interact with a computer. Now, people need to use a keyboard and a mouse to control the computer. Scientists invent technologies that ask for less physical devices. The future is about controlling technology with the natural motion of a hand or by using our mind, for example, thoughts. More PCs are becoming touch screen and in future, it will read people’s moves. Those moves and thoughts will control technologies.

Society:

Reduced Specialised Knowledge means that the programs are easy in use. Before to use Operation System developers needed to learn complex codes to open programs, applications and reach files. Now, people use the OS by clicking on icons and menus. People don’t need to spend the time to remember all the codes. Modern OS can use anybody from a child to an adult.

Input/Output changed with time. Before, cables had a very different head. People needed to have so many switchers to connect devices with each other. Now, people use USB and HDMI cables. Devices are smaller because there is no need to have many inputs for different cables. Headset before had two cables to connect, headphones and microphone. With time, headsets started to have one cable for both at the same time.

Image result for mac laptop

User Friendliness is how easy it is become to use devices and programs. Devices with touch screen made it easy and fast to use. Before, to write a text on the phone, people needed to press the same button many times to choose the right letter. In modern phones, each letter has its own button. Furthermore, people can make the text appear by using voice recognition technology.

Many technologies that we use in the kitchen or storerooms have domestic appliance displays. The displays are easy in use. For example, microwave, dishwasher and fridges. In the displays, people can choose what task the technology needs to do. A microwave’s display shows types of heating processes it can do, a dishwasher’s display shows the types of washes and a fridge’s display shows what temperature it will keep inside itself.

Specialised interfaces can help to people that have visual issues. If a person has a visual problem, the companies can provide technology that will control house technology by voice recognition device. The example of technology is Alexa. With Alexa, people can control lights, temperature and some other devices. The technology makes people’s life easier nowadays.

Image result for sublime text

Remote control of devices had an impact on people’s life. To access boiler people, need to be at home and interact with it through buttons. Modern boilers can be accessed remotely. A person can control a house temperature on distance. It impacted how people use electricity and heating. Also, now people have more information about how they use electricity, hot water and other aspects of the house through data logging. There are applications that record the amount of electricity and hot water being used. People can track their wastage through those applications. Those remotes and data logging applications help people to save money.

Image result for remote control technology

Economy:

Human Computer Interaction speeds up production industry and puts people out of jobs. Factories started to produce products more rapidly than they did before. The number of details for phone, computers, cars and other technology is incredible. People need to do less hard work to produce details. The robots do all the hard work. There is no need for a large crew to look after the robots. In this way, businesses save a lot of money on a crew and the rate of production is higher. Furthermore, the robots can check the quality of the product. The robot takes a few entities of the products and tests them in many ways. If the system will find broken models or product with bugs, it will send a message with the report on it to a crew that will take further actions. The factories becoming more automatically, and, in the end, factories need fewer people to work there.

However, technology also helps businesses to grow and speed up their employees. All businesses have their own websites that promote and gives more information about what they do. The companies can have a fast start. The company grows and open more vacancies for people. The devices that speed up the work rate can be computers, interactive whiteboards, phones and more. Computers store and process files for an employee. Interactive whiteboards help to deliver ideas or briefs to the workers faster which makes meetings more efficient. Phones give great communication inside the company. To write an email or make a call can be done outside the workplace or at home. Also, the graphical user interface decreases the complexity of a program. People are getting comfortable and capable to use an unknown program.

Devices that use voice and thought input create opportunities for disabled people. The ones that cannot read text can use voice input to communicate with the device. People that cannot use devices such as a keyboard and mouse can use a thought input device to control a computer. It opens more job vacancies for people that can’t work without extra help.

 

Culture:

Image result for socials

People became more connected with each other than they did bore. The Internet allows people to text, talk and video chat to a person on the opposite side of the world without delay. People meet a lot of new individuals online. Socials such as Facebook, Instagram and Twitter connect people. On these websites, people are matching, making new connections and finding jobs.

The socials give opportunities to be self-employed by starting own company. Instagram provide jobs that promote stuff like makeup, events and just funny videos. People making videos and uploading them on YouTube to get subscribers. The more subscribers a channel has the higher is salary. The video can be about science, gaming, news, personal blog, travelling and more other topics. People are using computers to earn money.

Also, people use computers to study. There are so many articles, theories and online books which is easy to find. The number of information people gains per day keeps increasing. People take online courses that give diplomas equally to colleges. The universities put their books, places to submit work online. Students must have laptops to study in universities, otherwise, it will be very difficult to keep the speed that a university asks for.

The technologies affect people badly as well. Mostly, the work is getting done in a sitting position. People are becoming weaker. Health is reducing. They get overweight, the rate of heart attacks increases. People must go to the gym to keep an active lifestyle. Technologies gave people no reason to keep do the hard work.

Some countries are giving private internet to the nation. A country like China has its own socials and internet. People cannot reach websites outside the country and people outside the country cannot reach their website and the internet. North Korea is a very isolated country. Sometimes, government use privet internet to deliver fake news to the nation. The people inside isolated countries can be very brainwashed.

Perception:

Perceptions are considered in different ways. A developer and a user might have a different way to imagine it. Clients who ordered a program might not be users which means that the team that develops the program might not have understandable feedback from the client.

Colors –

The program’s color aspects are very important. The wrong color might make the program hard to use. For example, if a developer will choose a light color for the text located on a bright background, it will be hard to read. People with bad vision won’t be able to use the program. The most common color that is used in Microsoft office is grey. Many people are thinking that grey is the most boring and not eye-catching colour. However, if everything will be bright, it will be hard to read a lot of text on the paper. The bright colors are used for headlines to bring users attention, after the headlines, it goes small text with less exotic color.

 

Pattern –

Patterns in HCI are used to make a document, program, etc. look more interesting. People can see the same pattern differently. The pattern is a template. Templates give us instructions or mark something important. For example, a cover of a book can have a pattern that draws customers attention. In HCI, such as a program, a pattern can mark option in a menu to give some kind of focus for customers or how the menu options are built. There are few standards of pattern such as proximity: when everything is located close to each other, continuity: when the line is changing its level but not rapidly, symmetry: mirrored shapes, similarities: an item that looks like other items, connectedness: items that are connected and related to each other, common groupings: similar shape, color, pattern items that are joined to each other.

 

Objects –

When developers doing an HCI program they must think about the size and shape of an object that is going to be used in the program. The object that is familiar to a user and that will be easy to use. An object in GUI would include Geons and Grass 3D

 

Geons: This is a 2D shaped object that can be improved to the 3D model object. The objects are very simple and easy to recognise. This is a 2D object that gives an illusion of a 3D object. For example, a ball that will have the shape of a circle.

 

Grass 3D – these are 2D objects as well. Hoverer, they are harder to recognise and to work with. They can give an illusion of a 3D object that is placed inside, on, behind and in front of another object. For example, a human that will stand in front of a car.

 

Behaviour models:

Nowadays, behaviour models are not designed from scratch. Developers take previous models and improve it. It decreases the time of the developing process, saves money and developers will know that the model will work. Previous models were tested, debugged which means that the model worked. That is why developers take models to improve them rather than built all over again.

Keystroke-level –

Keystroke-level model is used to count the time it takes for a simple input to finish a process. It can be a keyboard button or a mouse click. By using this method, people will test the process and find the most efficient way to finish a task. The task splits into a few steps where developers study what steps are necessary and which are not. By removing the unnecessary steps, the time of a process reduces.

 

Throughput –

Throughput model is used to see how long it will take to transfer the amount of data from one point to another. Also, the method can be used to estimate the amount of work the computer can do in a given time period. The method is used to count any transfer data such as transfer data from USB stick to a computer.

 

Fitts’ Law –

Fitts’ law is an equation that estimates the amount of time is used for a user to reach a target. It can be moving the mouse to click on a button that is located on a webpage. The equation is T=a+b log2 (2 d/w). T – stands for a time. The amount of time was used, “a” and “b” – stands for the two coefficients. “a” is the start/stop of the device. “b” is the speed of the device. “d” stands for distance to the target object. Stands for the width to the targeted object.

 

Key Action Model –

Keyboards contain a lot of buttons that carry a lot of functions. The keyboard can be split into fourth levels like letters, numbers, command buttons and symbols. Command buttons are the keys that are used in executive situations. The keys like ENTER, SHIFT, CTRL, F1, ESC, etc. By combining the combinations of the keys more options are created. HCI gives a keyboard to allow users to use many combinations and functions.

 

Buxton’s Three-State –

This is a model that gives to HCI understanding of the amount of pressure that is applied to a keyboard to a touchpad. Phones with touchscreen use the model. There are no buttons, people use fingers to control the system. Nevertheless, the system that uses the method still must provide the response command as a system that uses buttons.

 

Guiard’s model –

Guiard’s model is based on how people use their hands to control a system. People use different techniques and even hands to use a system. A person that prefers his right hand will use right-handed mouse movement that will not be comfortable for a person that prefers his left hand.

 

Information processing:

Information processing is how data is processed and the amount of time it takes to be processed.

 

Human as a component –

Human as a component in HCI means that humans are the main part of a system. It suggests that when designing a program a designer must consider that the GUI must be adapted to all users which might have different problems. There is a lot of research that must be done before making the GUI. The vision and physical problems must be included in the research. People might have difficulties with some colours or how the system will be controlled. For example, the system such as Alexa AI uses voice detection. Computers use devices such as mouse and keyboard. Xbox’s camera detects motions that control the system.

 

Human Information processing or HIP –

Human Information process is the way humans understands information. Human’s mind works very similarly to a computer. The body is hardware that detects any differences in an environment and a mind is a software that processes the information. However, people have different ways of processing information. Some people prefer to read a text, other people prefer to watch a video to process information better.

 

Goals, Operators, Methods and Selections (GOMS) –

GOMS stands for goals, operators, methods and selections is a method that finds the most efficient way of user carry out tasks and processing information that was given by a system.

By taking GOMS model to develop a system, designers have a chance to figure out the best way to give information to users and execute actions that slow down the whole interacting process of user and a system.

 

Specialist:

Accessibility is making sure that the interface support people with special needs. It would allow them to control the system as easy as people with no needs. Special needs such as color blind mode for people that cannot see some of colors, having audio interaction for people that have difficulties with reading a text.

 

Voice recognition is very helpful for people with disabilities when they use a HCI. Voice recognition transfer the words that the person says into text format. By this transferring data operation machines are able to interact with people through voice. Also, it is useful for regular people as well. For example, when they do a task that requires concentration such as cooking food or running, they can interact with the machine through voice to not stop doing their task. Also, it can transfer voice into a text for people that are having hearing problems.

When it comes to people who have visual issues, they need to have options to change the size of the text such as zoom in. This means that people can read the text without using additional objects such as glasses or programs. The easy example of the situation is when a person trying to read a newspaper on a Ipad or laptop. Without the zoom in option they would find it very difficult to read the text. Contrast between a text and a background is very important as well. Some people have difficulties with focusing on objects. If the text is similar in color to a background color, even a regular person will struggle to read the text, not saying about a person with visual difficulties.

 

Those are small things that makes the HCI usage much more easier for people. Also, it is increase the amount of people that can use the program which is very important for companies. The more people can use the program, the more benefits companies can get from their product.

 

For the HCI program I am planning to make a game. The game is where a person will be able to interact with the ball by hand. The method can be used in a basketball game. This is an example of a game that I want to make a program about:

Image result for vr basketball

Create Input and Output –

The input of the game is Leap Motion. The device is scanning the hands and transfers it to the virtual version. The virtual version is copying most of the movements that the user makes. Within the device, the user can interact with the virtual world. The interaction can be moving, pushing, lifting, etc. objects in the virtual world. The device looks like this:

Image result for leap motion

The output of the game is a display. The display shows whatever is happening in the virtual world. It shows the virtual hands movement, what objects are in the world and how the objects behave when the user interacts with them or not.

Test the program –

I added the screenshots below to prove that the game is working.

As we can see, there is only one hand on the monitor. It is because the other hand was busy taking screenshots. However, the screenshot shows that the ball is added into the game as well as hands movement.

pic2.png

The second screenshot shows that the game allows interacting with the ball. The ball was on the ground when the game started. Later on, the ball was lifted up by using hands.

pic4.png

Documentation –

To create the game that I did, I used those two programs. One is Unity Core Assets 4.4.0 and another one is Leap motion interaction Engine (1.2.0).

I opened the unity and created a new file. After that, I imported the Leap Motion Core Assets. The module adds many objects and functions into the program. The next step is importing Capsule Hands. The file imports the hands into the virtual reality. This is why the user can move the hands and it will be mirrored in the program. After that, I imported the plane and the ball. The plane is a floor for the world and a ball is an object that I can interact with. This is how it looks like.

pic5.png

The ball is located higher than the floor at the beginning of the game. It allows the ball to fall down when the game starts. This makes sure that the ball has physics and user will be able to interact with it.

1
Enter a caption

pic6

2.PNG

3.PNG

To make the ball fall, I need to add the physics option to the ball. This is how it looks like

I added the ball that has the scale 0.1 in each direction. Because in the beginning, the ball was too big. After that, I added sphere collider and rigidbody. The rigidbody adds mass and angular drag to the sphere which applies the ball to the physics.

pic8.png

In the beginning, hands cannot interact with the ball. To make the hands able to pick up the ball, the manager interaction must be imported to the program and applied to the hands. On the screenshot, we can see that the manager is interaction manager and on the picture below it shows that only three fingers can interact with the ball to pick it up.

pic6.png

The interaction behaviour is applied to the ball. To make the hands able to pick up the ball, the behaviour must be applied to the ball or any other objects that the user wants to interact with.

pic8

Explain how the effectiveness of HCI may be measured –

Input speed –

Effectiveness can be measured by input speed. In this case, it depends on how fast the device that scans hands processing information. The better the device is, the faster the input will be. If the device is not powerful enough, it might cause slowness and the quality of the output in the program. The output will fully depend on how the device scans the hands.

Output speed –

Output speed is another measure of the effectiveness of HCI. The output depends on the input as I said before. Also, the output can be affected by how the computer processes the data in the program. Powerful computers will process the data faster than the slow ones. The waiting time will decrease if the computer has just enough or more power than the program asks.

Running costs –

Running costs can slow down the program which will decrease the effectiveness of the HCI. The program that I used, has fewer features than the pro version of the program. Pro version has many options and does the more advanced calculation. If the program game is made with many features, it can slow down the effectiveness because the computer must process more data.

How many features work –

Sometimes, when a developer creates a program, some of the features can cause errors. It decreases the effectiveness of HCI. Some of the features can conflict with each other. This will cause errors in the program and it might not run correctly. Also, it is important how many features are available in the program. The more features are available, the more interesting the program will be.

Comprising with other systems –

Also, the effectiveness can be measured by how many systems can support the program. Some of the Operational Systems cannot run the program which will be impossible to run the game.

Bibliography:

http://thehcifuture.blogspot.com/2015/02/p1-describe-impact-of-hci-on-society.html

HCI Future, “Unit 23”, Day of access – 09/03/2019

https://www.leapmotion.com/

Leap Motion, “Leap Motion”, Day of access – 10/03/2019

https://slideplayer.com/slide/7021215/

Slide Player, “3D interfaces”, Day of access – 11/03/2019

Pearson Education Limited, Information Technology LEVEL 3 book 1 BTEC National, Edinburg: Edexcel, 2010.

Unit 7

Task 1

Protentional threats:

Malicious Damage – it is damage that was made on purpose to a company or a person. For example, a hacker can get into the system and make some changes that will cause errors. The company will spend money and time to fix the problem. Another example, when a hacker gets into someone’s data, stealing and revealing a person’s information on the internet.

E-Commerce threats – these are threats that related to the companies that sell goods on the internet. The threat can be damaged products, stealing products in a hacking way an error in a system that will lose a product.

Counterfeit goods – it can be called as copyrights. These are goods that were sold by another brand mark name without their authorisation. These goods are fake but can cost as much as original ones.

Technical failures – Human failures can be miss clicks, wrong input such as name, age or any other detail of someone or something. Also, technical failures are thefts. Those a website or person that are stealing equipment. Fake websites that sell products that are not the same as they say so or when the product delivers, people can steal it from porches, mailboxes and other safe places.

 

Malicious damage:

Internal damage – It is a damage that comes from companies themselves. The internal risks can be caused by companies’ organisation, database and other factors.

External damage – it is damage that comes from factors that are not fully related to the company. Those things can be changes in the market and natural disasters that affect companies’ operations such as delivery.

Viruses – they can cause damage to the companies by slowing down their system, deleting files and changing their database.

Phishing –it is stealing customers’ data damage. Those attacks used to steal customers’ credit card numbers, name, date of birth, address and there are more.

Identity theft – these people that use someone else’s information. They use other people’s information to steal money, get loans from banks and buy properties. After they do those procedures, they despair and a person’s information they used needs to do an investigation to prove that it wasn’t himself.

Piggybacking – It is access into a person who hadn’t log out. It happens in social places such as libraries. When a person didn’t log out, another person uses the same PC and accesses socials or other accounts that are logged in on a computer.

Hacking – This is a procedure that accesses the accounts or system without their promotions. People are hacking to get information and money from somewhere that they not allowed to be.

 

Threats to the E-commercials:

Defacement of Website – it is an attack on the website to change the original one to a hacker’s one. The website changes its visual that might suggest that the website was replaced. It happens to get money from a trustful source. The users won’t even realise that the money they give to the website goes to another owner and they won’t get stuff that they pay for.

Third party supplier – It is a website that sells products which they didn’t receive from the primary manufacturer. Third party supplier can have fake goods which are illegal, and users won’t realise that they pay full price for a fake product.

Denial service attack – it is an attack that makes users won’t be able to reach a website. The hackers disturb website’s host that is responsible for the internet connection. Because of these problems, companies are losing a lot of money.

 

Counterfeit goods:

Produces such as software, DVD’s, games and music can be transferred to another user by a peer-to-peer connection. It is illegal because people must pay for each copy of products, however, that connection allows them to share the products between each other with no charge. That is called copyrights.

 

Organisation impact:

Loss of service – It can cause a lot of damage to companies. One service can cause a lot of problems. Services such as connection to the internet, security services and software services can destroy an entire company that works on the internet. Hackers will be able to steal all the information from them if security stop work. The company won’t be able to sell anything to customers with no connection to the internet that will make them lose a lot of money.

Loss of income – this is the blood of the companies. The money must run through the company. If there will be no money, it means there will be no company. Loos of income means that the company won’t be able to pay their bills which means that the company will be bankrupt.

Loss of customer records – firstly, if it will happen in the company, it means they don’t have a security system which is illegal. The company will get shut because they aren’t following laws. Data Protection Act of 2000. Secondly, it can cause a loss of income.

Increased cost – It has a few meanings. If a website will increase their prices, the people might stop buy it which will cause the income loss. Secondly, if services will get increased cost, the company must need to change it, that can cause the company to be bankrupt.

Poor image – It can reduce income because people won’t trust the quality of the website. Also, people won’t be able to see what product the company sells that reduces income as well.

 

 

 

Information security:

Confidentially – it means that the data must be private. That the company won’t share the information they have. It can be customer information, employee information and other people that agreed to give the information to keep them private.

Data integrity – it is an organisation where data store. The data can be stored in a database, data warehouses and somewhere where the data will be organised.

Data completeness – It is how the data stored. The data can be stored by validity, date, size and reasonable choice to store the data by its attributes. This will reduce data loss.

Access to data – It is security levels. Not all employees can access all the information about a customer. There are levels that reduce information leaking. For example, managers might need to know more than employees, that’s why there are levels of access. To secure customer’s information.

 

Task 2

Hack The Box

Stage 1

This is how the menu in “hackthebox” looks like. It asks for the invite code; however, it doesn’t tell you how to get it.  So, let’s start search more about the invite code. To open the Google Chrome console, we need to press “f12”.

hackthebox 1.PNG

Stage 2

hackthebox 2.PNG

We can see links for the scripts. First one and second one has the link https://hackthebox.eu before the JavaScript unlike second one. Let’s add the link before the second JavaScript. It will look like this “https://hackthebox.eu/js/inviteapi.min.js”

Stage 3

eval(function(p,a,c,k,e,d){e=function(c){returnc.toString(36)};if(!”.replace(/^/,String)){while(c–){d[c.toString(a)]=k[c]||c.toString(a)}

k=[function(e){return d[e]}];e=function(){return’\\w+’};c=1};while(c–){if(k[c]){p=p.replace(new RegExp(‘\\b’+e(c)+’\\b’,’g’),k[c])}}return p}(‘1 i(4){h 8={“4″:4};$.9({a:”7″,5:”6″,g:8,b:\’/d/e/n\’,c:1(0){3.2(0)},

f:1(0){3.2(0)}})}1j(){$.9({a:”7″,5:”6.”,b:\’/d/e/k/l/m\’,c:1(0){3.2(0)},f:1(0){3.2(0)}})}’,24,24,’response|function|log|console|code|dataType|json|POST|formData|ajax|type|url|success|api|invite|error|data|var|verifyInviteCode|makeInviteCode|how|to|generate|verify’.split(‘|’),0,{}))

 

This is the code given to us on the page.  It looks confusing at first, but we need to focus on the last part. It tells us to make an invite code. There should be a script or message about it, let’s go back to the main page and search for the “makeInvitecode()” function.

 

Stage 4

We found data about the invite code. The message is encoded and below it says “BASE64”. BASE64 is a type of encoding schemes. To decode the message, we need to find a resource which will help us do it. In my case, I used “hackbar”. It has multiple decoding functions. Also, it will help us in the next steps.

hackthebox 4.PNG

Stage 5

This is how the message looks before decoding it:

hackthebox 5.PNG

This is how the message looks after decoding it:

hackthebox 6.PNG

To make a POST request we need to join the link of the hack the box website and link which they gave us after decoding the message. This is how I did the POST request.

Stage 6

hackthebox 7.PNG
It sent us to another page with the message on it. It contains encode a message, again. We did in “stage 5”, so, let’s do it again.

hackthebox 8.PNG

I put the message in the “hackbar” and pressed “unbase64” button. It gave us a key. This is the key to the menu from the first stage. Now we need to input it in the menu. After we do that, the menu changes. It gives us a registration menu where we can input details and continue to discover the website. This is how the menu looks like:

hackthebox 9.PNG

Physical Security:

These are security guards that look after building security and staff inside it.

Locks are made to reduce unwanted people from wandering around the building and finding information that they don’t need to know. This will increase the security level of data that the company keeps on servers.

Visitors passes have reduced access to the building. These are made to give people that are coming for a meeting and other people who won’t stay long in the building. Those people won’t need access to every single door in the building. It increases the level of security.

Sign in and out systems make sure that the people who entered the building are leaving it at the end of the shift. It is made in case if people will get lost in the building or if people will try to get access to information that they don’t need to have. Because it takes time to hack into the system.

Biometrics are important to have because it is much harder to copy than a regular pass. The retinal scans, fingerprints and voice recognition are much harder to hack which is increasing security a lot and decreases the number of unwanted invaders.

Guards are reducing physical violence when cable shielding protect cables where hackers can get into the system. By connecting their hardware to the cables can give them access to the data. Therefore, the cables are highly protected and have people that watching after them 24/7.

 

Software and Network Security:

Public and private key – A public keys are encrypting everything that they send, messages, email and other data. To read the message that public key encrypted a user must have a private key. Public key encrypts and private key decrypts.

Call back – it is a function that sends to another part of the system as an argument. If the information that passes next is valid, the system grants access.

Handshaking – It is a method that makes a connection between a client and a server. However, before the data communication will begin, the two software must validate each other acknowledgement packets.

Diskless networks – It is a network that shares the operation system and other data from a server but not from hardware’s disk because the workstation doesn’t have a disk to run the operating system.

Use of backups – It is a stage of a system when everything runs correctly. In case of any errors, a company can go back to the stage where the system runs properly.

Audit logs – It is a document that records every IT operation in a system. It is documenting what resources were accessed.

firewall configuration – It is settings of how the firewall was installed. It has a database of what websites can work in the system, what files can be saved in the software. It is a customisation of a firewall.

Virus checking software – it is an antivirus that constantly checks software for viruses. It makes sure that no malignant processes are detected in the system.

Virtual private networks (VPN) – It is a network that allows software to connect to another private network by sharing data through public networks.

Intruder detection systems – It is software that detects if no unauthorised accesses were made in the system. It can be detected if two of the same users log in at the same time. Or someone logged in the system from an unknown IP address.

Passwords – They are increasing the level of security and privacy. A password must be private information and only an owner must know the password.

Levels of access to data – It is a level of what information employee can access. For example, managers need to know more information about a client than a team member.

Software updating – It is important to have the software updated. The security improves with each update. More features are added to the software with an update. Bugs are getting fixed with new versions of the software.

Backup systems – It is a second server that runs at the same time as a primary one. In the case of a failure or shut down the second server can replace the primary one. It won’t slow down the progress of the company, and customers still will be able to reach the company.

Whole system replacement – It is the most unwanted process in companies. It is a method of recovery of a whole system plan based on the possibility of a happened disaster.

Tiers of recovery – It is a plan of cost and values of recoveries. The lower tire is the more expansive recovery will cost. Also, It is a diagram to show how long it will take an approximate cost. The most often number of tires is 7.

 

Task 3

PowerPoint:

Security

 

Bibliography:

https://www.itpro.co.uk/data-protection/28085/what-is-the-data-protection-act-1998

ITPRO, “Data Protection Act 2000”, Date Of Access (15/02/2019)

https://searchdatabackup.techtarget.com/definition/backup

TechTarget, “BackUp”, Date Of Access (15/02/2019)

https://www.hellermanntyton.com/competences/cable-protection-conduits

HellermannTyton, “Cable Protection”, Day of Access (15/02/19)

https://computer.howstuffworks.com/firewall2.htm

HowStuffWorks, “Firewall Configuration”, Day Of Acess (15/02/2019)

https://www.gemalto.com/govt/inspired/biometrics

Gemalto, “Biometrics”, Day of Access (15/02/2019)

 

unit 14 part 2

Task 1

What the game will be about.

   In the game a player can create his own specific character. In my game it will be skill points. In the skill points the player can make strong and weak sides of the character. If  the user wants to see powerful and strong character who will do everything with fights, he will increase the strength but decrease luck or intelligence, for example. There will be four skills which the character will have. The skills will be Strength, Luck, Endurance and Intelligence. With different improved skills the game will play differently. With strength skills will be more fights and with intelligence skills will be more dialog. I want to make the with many ways to play in it because players will be interesting to play the game few times with different methods. In the game will be dialogues and different answers will cause different progression in the future.

Also, there is going to be fighting system. Where the player and NPC/s will make they move by turns. The skill points will make differences in fighting too. There will be few classes in the game. Magician, warrior and thief. Magician can attack from distance. Warrior will be heavy fighter in close range and make moves slower but powerful. And thief will be able to make few moves in one go. The thief character will be based on combinations. They might be not powerful sometimes. However, if the combination will be good, it will make huge damage. There is going to be a little story with sides missions. To make the game more interesting and diverse.

The story will be about a warrior which was invited by a king to assassinate his main enemy. The warrior will travel a lot and collect the information about the enemy. He will meet with many other characters and find out something else. The warrior will have a choice who he needs to support, truly. The King which hired him or the enemy with different world view.

The game will be based on 2D graphic with few fighting features. As I said before the fighting will be made by turns. Also, there is going to be locations like caves or chops where the player can purchase items which will help him to win enemies which will try to stop him.

Alpha version of the game.

   If something will go wrong or the code will be too complicated, some features will be deleted from the game. What definitely will be in alpha version are Skill Points, Dialogues Trees and Fighting system with only one type of character. At the main screen the player will be able to spread skill points which he will have at the begging. Dialogues will be in the game to make at least small interaction with NPC/s. Fighting system will be in the game to have a point to play in the game. The game will have a challenge otherwise, it will not be interesting at all.

The main features in the game will be Skill Points, Dialogue Trees and Fighting. This is the main sides of the game which can make it really interesting.

Inputs and Outputs

Inputs Explanation Outputs Explanation
Character’s Name Players will be able to call the character with their names. The game will contain more RPG (Role Play Games) aspects and make the character even closer to the players and users. NPCs’ Names The game will show the NPCs’ names because it will increase role play in the game
Skill Points The players will be able to change aspects of the main character. The style and way to play in the game will be different with combination of the skill points Skill Points Before the character will change the skill points, the game will show to the player how many does he have it and how much he can increase it.
Dialogue Trees When the player will interact with the character it will have few options for an answer. The game will change relationships and story with specific answers. For example, the character can be more friendly with NPC or more straight and heartless. Dialogues The Game will show few speeches from the NPCs and also will give few options for answers. To make the game more interesting it needs to give to the player make choices. It will make the game more interesting in story and interacting way.
Fighting Combinations There will be few type of attacks which can make many different combinations. To make the move the player will press a button which will start an attack. It needs to have simple way to activate specific move, that’s why I will use buttons. Fighting System The game will show to the character how strong is his opponents. Also, it will show what the main character will have and how much damage did the player make. It will represent player’s health and an enemy’s health to know how much damage do the player need to do to kill it.
Movement Player needs to press buttons to move on sides, up and down. The game will process the input and decide where the game will move character.

 

Processes

   The game will get changed by comparing the user’s choice. The choice can effect the game in dialogues, for example. The game will save the users answer or keep tracking score with the NPC. For example, if the player was bad with NPC it will add point to the bad ending, if the player helped to many people, it will add a point to the good ending. AT the end the game will see how many point did the player get and will play one of the two endings.

  Also, the game needs to understand what type of character is player will use. Warrior, Magician or Thief. The game needs to understand which attacks it needs to show to the player. Magician might health himself and others don’t. The game needs to show only to the magician a option to health himself.

To move the character the player needs to press buttons. To decide which side the character will move, developer needs to put specific code for each input. (Left, Right, Up, Down). If the player needs to move right, the coordinates will increase. Different side means different formulas.

Pseudo code

   Pseudocode was created only for developers. The program will not see it and count it as a error. Pseudocode is comments inside the program to make the code more understandable. It is very useful for other developers which want to improve the game. The comments will help them to understand what the part of the code does.

   Pseudocode is very important part of coding because it helps to improve and make the game more better. Without the pseudocode the code will be confusing and hard to read even for a professional.

I will insert inside my code many pseudocode to name and explain what this part of the coding does. For example, when I will write a code about movement i will put on the top that this part of the code is about movement. After, some of time when I need to improve something in movement code, I will find it faster than if there wasn’t a pseudocode.

Flowcharts

Movement

Above the picture shows how the movement will work in the game. The game always will wait for a input from the player. If the player wants to go left the player will press “a”. The game will start to take away from character’s x coordinate to make an illusion that the character actually going left. If the player wouldn’t press a the game will go to the right side. When the player will press “d” the game starts add to the player’s x coordinate to make the character move on the screen. If player didn’t press “d”, the game will go to “w” and “s” to do the same scheme but with y coordinates. If the player didn’t press anything the game will go back and to loops until he will input something.

Skills

The flow charts shows how the Skill Points will work. Also, as with Movement, the game will do the loop to wait for inputs from the user. The user can change these four skills points. When the player changes endurance skills; the game skips Strength and Luck and then checks if the user added or took a point. Nevertheless, there isn’t going to be infinity amount of skill points.  When the game starts character has 3 points on each skills and the player can added only 5 to it. This adds to the game more challenge and  realistic. The player can get more skill points further in the story mode.

Dialogues

There is going to be three choices for the dialogue system. First answer is always good, second answer is always bad and final third answer is neutral. The game will keep track how many points does the character has for good and bad points. If the player has more good points the ending will be good. If the player has more bad points the ending will be bad. The game will be made which will make impossible to get the same amount of both points.

StoryBoard

Skill Points

Skill points screen

   This is how the Skill Points’ Screen will looks like. The player has 3 points for each skills. The player can add or take points from the skills. The minimum amount of points in one skill is one. When the amount of points will be equal to one the minus button will no be available anymore. As same with plus when the player will not have Skill Points anymore. The player can add as many skill points as he wants until is less than 10. The maximum amount of skill points on each skill is 10.

Skills will change a bit a little bit in further story. If the intelligence will be less than the strength the player must will fight more than the player with intelligence. Also, the player will intelligence has more chance to get a discount in the shop. However, the damage will not be as high as the player with strength. Luck will effect on items which the player will find after the killing enemies or amount of money.

 

Dialogue system

Dialogues

On the top it always will be a speech  from the NPC. In this case the NPC greeting our character and asking what is he doing this far from the city. Underneath that the player will have always three choices. Good answer, bad answer and neutral answer. It depends how many times is layer will use these answers. The game will count it and change the further story of the game. It can go brighter or darker. I decided to do the dialogue tree in the game because it will make the players play few times in the game to see different options. The story might be short. Nevertheless, it will has a lot of options where the user will spend some time to decide what way does he want to go.

The structure of the dialogue tree is easy. The first answer is always good. The second answer is always bad. The last answer is always neutral. The structure will be made this way to not confuse the player which one is good answer and which one is bad. Furthermore, the game will not tell to the player this officially.

The dialogue will locate above the characters.

Screen Layout

   I am planing to make a 2D game. The character will be faced towards the player. There is going to be few levels of a ground. For example, if the action will be happening in the castle, I will draw two floors. I want add to the game some puzzles which the player needs to solve. To do that it will be more interesting if it will be happening on few levels to make it more challenging.

The dialogues will locate above the character when there is going to be to talk to. For example, if the character will talk to the NPC villager, the dialogue will take half of the screen above the character and the NPC.

Also, on the screen will be enemies. They will be programmed to walk the same way and in loop. This will give to the player a tactic to defeat them

Screen Components.

   On the screen the player will see character. The way and roads on which the player can walk. On some location the player will see few levels of the ground. To move between the levels the player needs to jump or go down. Also, at the beggining of the game the player will see a menu where he can change few settings to make the game more comfortable for himself. For example, edit the sound or add the skills after he will gain one. The is going to be a label of the setting icon on the top right corner of the screen. Also, the game will have 2D graphic but it still will have a background behind characters. This will increase the atmosphere of the game.

   Furthermore, the game will have specific menus for the shops and fighting menu. When the player will fight on the screen will appear few icons for specific attacks. For the shop the menu will have few labels which will separate different type of items like, swords, bows, poisons and armors.

Events.

   By pressing buttons on the screen the player will activate specific actions for specific input. For example, when the user will press the plus next to the strength. It will suggest that the player wants to add the point to the strength skill. Firstly, the game will check if the player has enough skill points to add to it. If the Strength’s skill points are not equal or above 10.

   Another example can be movement. When the player won’t press anything the character will not move or do anything. When the user will start to interact with the screen the game will get inputs from the player. Specific input will cause specific action. If the player will press the button with arrow’s image which is pointing left. The game will find character position and if there is not going to be any

Task 2

Decisions

   I am planning to code the game in the app inventor. Nevertheless, I will be even more happier if I will do in java script which will increase my coding skills with reason that the java script language has many complicated codes. I decided to do it in app inventor because it will improve my planning skills and sorting skills which will help me in future with actually coding formulas.

   I will do RPG game because is one of the most popular genres in the game businesses and the most interesting genre to play in it on the phone. Nevertheless, role play games have many options and features which can be added to the game to interest the players. The RPG games can be played long time because there are many options and choices which user will not be able to see by playing one time only.

These fight, dialogue and skill points systems will give to the player more choices to make and more alternative ways to play the game. The players like freedom in games and when the game gives it to them; the game becoming a mainstream, especially when youtubers will get in the mainstream.

The story was maid to make the game in adventurer genre to meet and learn more from the game’s world. New creatures, enemies and friendly NPC which will be on the character’s way all the time. Interacting with someone or something keeps the player alert.

unit 14 part 2

Capture

inventory = ()
if not inventory:
print(“You are empty handed”)

inventory = (Sword, Shield, Poison)

input(“Press enter to get something to the inventory”)

for item in inventory:
print(item)

start = len(inventory)
finish = -len(inventory)

import random
position = random.randrange(finish, start)
for item in range(6):
print(inventory)

 

Unit 16

Task 1

About the program

    The program will call “Guessing Game”. In the game a user need to guess the number which the program will make. It will say if the number is too low or too high. The program is arcading text game where the user can spend his time in the game. Program will contain few maths equations, input and outputs from the user.

To let user interact with the game the program needs to have codes for input. In the input user can write a number which he thinks the guest number is. The program will have a menu where the user can read instruction how to play in the game and where the user can start it or quit from there. Python will be used as computer language to create the game.

Task 2

Flow charts

  Table.

This is the main flow charts which shows how the game will work. At the beginning the user will be in the menu. The menu will looks like this:

Screen Shot 2018-01-30 at 09.51.44

In the menu user will have three options. Also, she/he needs to input numbers. The first option is a start. The start means that the guessing game will begin when the user will input “1”.

The second option is instructions. In the instructions the program will say about itself and few rules which the user needs to follow. The instructions’ text will look like this:

Screen Shot 2018-01-30 at 09.59.29

The third option is exit. If the user will choose 3 option the program will close itself. It made because if the user will lose or win the game he will be returned to the main menu. To make sure that the user will be able to exit from the game.

After the menu, if the user chose first option, the guessing game will start. Firstly, the program will create the number. After that, the user will have an message from the game where she/he can input his guess. If the guess is too high or low the game will tell to the user this and she/he will have another go to guess the number. To make the game shorter the user will have 5 lives. After the user guessed or didn’t guessed the number the program will return the player back to the main menu.

Variables

Meanings

The game has few integers. It is answer, guess and live. the “answer” means that the program will take a number between 0 and 100 and remember it. While the user didn’t guess the number or didn’t use all lives (which is 5) user will input his guess which is next variable. The “guess” is an input from the user which means that it is one of the few guesses. The user can tell his guess to the game and the game will say if it correct or not, high or low.  To make the game more difficult the player will have only 5 lives. The last variable is “lives”. At the beginning of the game lives are equal to 5. With each try the game will take out one. Once the lives are equal to 0 the game will finish.

 

Unit 3

DATA

What is data?

Data is individual pieces of information. Data is made of numbers, letters and symbols. For example date of birth, postcode and credit card number.

Tesco club card

Image result for tesco club card and postcode

The Tesco Club card is the first big company in the UK which started to collect and analyse the data of their costumers. The First Club Card was present in 1993 like a magnetic card. The card needed to be swapped at the checkout to get points to get a discounts after. However, in 2003 and 2005 the card was changed. They changed design and the properties of the card. In 2005 the card could be scanned rather than swapped. This made much easier to use the card. After that they start to develop it. People could move the points and use it in the restaurants and other companies.

How do they use data?

Tesco Club Card uses and analyses a lot of data. The most important data what they use is postcode, date of birth and discount which you bought before. Only these three types of data can tell a lot about information. Tesco can know almost everything about a costumer which gave his data to them.

How information about costumers used?

 Postcode. In different areas Tesco has different products. For example in West of London Tesco has more Indian food than in other areas. They use postcode to know on what products you might need vouchers. Nevertheless, Tesco need costumers’ postcode to actually know where do they live.

 Date of birth. For example if a buyer is less than 18 years old he definitely is not going to get vouchers on alcohol because he can’t buy it yet. Usually, the teenagers are buying drinks, sandwiches and snacks. The system is analysing it and might sent some vouchers to them because they are regularly buying this.

Discount The system in the Tesco analysing and has a special code which is counting when you will need this item. For example “Vanish” for washing machine. The system can count for how long it takes to finish the pack. Usually, Tesco is sending a interrogation which makes it easy to sent vouchers to the costumers. Usually, the pack of “Vanish” takes two weeks to finish. So after two weeks Tesco can sent a voucher for the product to a costumer. Also, contact lenses. In one pack is three pair of the lenses. It takes around three months to finish it. If you bought at least one time the product in Tesco, it sent a notification which tells that it is time to buy new contact lenses.

Good information

Valid

Valid is information that still works and correct. When someone is using a credit card in the shop, the system processing the information about the credit card. If the credit card isn’t expired and has a right credit card number then the information about the credit card is valid.

Reliable

Reliable is an information that is trustworthy to a person/costumer. When someone applies for Tesco Club Card they need to give some information about them self. For example,  name and surname, date of birth and postcode. The system checks if the information is not fake and has no problems with it only then the costumer can receive Tesco Club Card.

Timely

Timely is an information which will be available for uncertain period of time. The information is not going to be available for ever. In Tesco timely information is discounts. In some day there are discounts on drinks. In another day the discounts is on a different product.

Fit for purpose

 

Accessible

 

Cost-effective

 

Accurate

 

Relevant

 

Have the right level of details

 

Reliable source

 

Understandable by the user

What is data?

Data is a

Tesco club cardImage result for tesco club card and postcode

The Tesco Club card is the first big company in the UK which started to collect and analyse the data of their costumers. The First Club Card was present in 1993 like a magnetic card. The card needed to be swapped at the checkout to get points to get a discounts after. However, in 2003 and 2005 the card was changed. They changed design and the properties of the card. In 2005 the card could be scanned rather than swapped. This made much easier to use the card. After that they start to develop it. People could move the points and use it in the restaurants and other companies.

How do they use data?

Tesco Club Card uses and analyses a lot of data. The most important data what they use is postcode, date of birth and discount which you bought before. Only these three types of data can tell a lot about information. Tesco can know almost everything about a costumer which gave his data to them.

How information about costumer used?

 Postcode. In different areas Tesco has different products. For example in West of London Tesco has more Indian food than in other areas. They use postcode to understand on which products you might need vouchers.

 Date of birth. For example if a buyer is less than 18 years old he definitely not going to get vouchers on alcohol because he can’t buy it yet. Usually, the teenagers are buying drinks, sandwiches and snacks. The system is analysing it and might send some vouchers to them because they are regularly buying this.

Discount The system in the Tesco analysing and has a special code which is counting when you will need this item. For example “Vanish” for washing machine. The system can count for how long it will take to finish the pack. Usually, Tesco is sending a interrogation which will make it easy to give vouchers. Usually, the pack of “Vanish” takes two weeks to finish. So after two weeks Tesco can send a voucher to you for the product. Also, contact lenses. In one pack is three pair of the lenses. It takes around three months to finish it. If you bought at least one time it  in Tesco, it will sent a notification that will tell that it is time to buy new lenses.