-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
1005 lines (949 loc) · 57.9 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE HTML>
<!--
Dimension by HTML5 UP
html5up.net | @ajlkn
Free for personal and commercial use under the CCA 3.0 license (html5up.net/license)
-->
<html>
<head>
<title>Portfolio</title>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no" />
<link rel="stylesheet" href="assets/css/main.css" />
<noscript><link rel="stylesheet" href="assets/css/noscript.css" /></noscript>
</head>
<body class="is-preload">
<!-- Wrapper -->
<div id="wrapper">
<!-- Header -->
<header id="header">
<div class="logo">
<span class="icon fa-gem"></span>
</div>
<div class="content">
<div class="inner">
<h1>Portfolio</h1>
<p>Welcome to my Portfolio. <br />My name is Sulayman, I am an IT Student.</p>
</div>
</div>
<nav>
<ul>
<li><a href="#intro">IoT and CyberSecurity</a></li>
<li><a href="#about">About</a></li>
<li><a href="#contact">Contact</a></li>
<!-- <li><a href="#elements">Elements</a></li> -->
</ul>
</nav>
</header>
<!-- Main -->
<div id="main">
<!-- Intro -->
<article id="intro">
<h2 class="major">Iot and Cyber Security</h2>
<span class="image main"><img src="images/cs.jpg" alt="" /></span>
<p>IoT and CyberSecurity has become more important in our live which we can not live without it.
so in this part of the protfolio, I will explain what I have learned about it.</p>
<h2><a href="#introduction">Introduction</a></h2>
<hr>
<h2> Activities</h2>
<div class="table-wrapper">
<table class="alt">
<thead>
<tr>
<td>
<figure>
<a href="#act1"><img src="images/scanning.png" alt="" class="scanning"><br><br>
<figcaption>Scanning</figcaption>
</a>
</figure>
</td>
<td>
<figure>
<a href="#act2"><img src="images/honey.png" alt="" class="honey"><br><br>
<figcaption>Honeypot</figcaption>
</a>
</figure>
</td>
</tr>
<br>
<tr>
<td>
<figure>
<a href="#act3"><img src="images/ddos.png" alt="" class="ddos"><br><br>
<figcaption>DDoS</figcaption>
</a>
</figure>
</td>
<td>
<figure>
<a href="#act4"><img src="images/digitalisation.png" alt="" class="ddos"><br><br>
<figcaption>Digitalisation</figcaption>
</a>
</figure>
</td>
</tr>
<tr>
<td>
<figure>
<a href="#act5"><img src="images/top10.jpg" alt="" class="ddos"><br><br>
<figcaption>OWASP Top 10 and IEEE Top 10</figcaption>
</a>
</figure>
</td>
<td>
<figure>
<a href="#act6"><img src="images/vdatabase.png" alt="" class="ddos"><br><br>
<figcaption>Vulnerability database</figcaption>
</a>
</figure>
</td>
</tr>
<tr>
<td>
<figure>
<a href="#act7"><img src="images/arduino.png" alt="" class="ddos"><br><br>
<figcaption>Arduino uno</figcaption>
</a>
</figure>
</td>
<td>
<figure>
<a href="#act8"><img src="images/bestele.png" alt="" class="ddos"><br><br>
<figcaption>Best Elevator</figcaption>
</a>
</figure>
</td>
</tr>
</thead>
</table>
</div>
<br>
<button onclick="goBack()">Back</button>
</article>
<article id="introduction">
<h2 class="major">Introduction to IoT & Cyber Security</h2>
<h3>What is IoT?</h3>
<p>The Internet of Things (IoT) is the network of physical objects—devices, instruments, vehicles, buildings, and other items embedded with electronics, circuits, software, sensors, and network connectivity that enables these objects to collect and exchange data.
The Internet of Things allows objects to be sensed and controlled remotely across existing network infrastructure,
creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency and accuracy.
The concept of a network of smart devices was discussed as early as 1982, with a modified Coke machine at Carnegie Mellon University becoming the first internet-connected appliance,
able to report its inventory and whether newly loaded drinks were cold. Kevin Ashton (born 1968) is a British technology pioneer who is known for inventing the term "the Internet of Things"
to describe a system where the Internet is connected to the physical world via ubiquitous sensors.</p>
<h3>What is Cyber Security?</h3>
<p>Cybersecurity may be defined as the ability to protect and recuperate from cyberattacks. According to NIST (National Institute of Standards & Technology),
it can be defined as the ability to defend cyberspace usage from cyberattacks. Cyberspace could be internet, computer systems, telecom networks, embedded controllers etc.
The security of any organization completely relies on three key areas namely confidentiality, availability and integrity.</p>
<h3>why do we need cyper security on IoT gadgets?</h3>
<p>The large number of interconnected devices and their varying levels of security make IoT networks vulnerable to cyber attacks. Hackers can exploit vulnerabilities in the devices' software, weak passwords,
and other security flaws to gain unauthorized access to the network, steal sensitive information, and even take control of the devices. Once a hacker gains access to an IoT network, they can use it as a gateway to attack other systems or launch larger-scale attacks.
<br> To mitigate the risks of cyber attacks on IoT networks, it is crucial to implement robust cybersecurity measures. This includes using strong passwords, encryption, and authentication mechanisms, as well as keeping software and firmware up-to-date with the latest security patches.
Network segmentation, firewalls, and intrusion detection systems can also help prevent unauthorized access and limit the impact of any attacks.
<br> Overall, the cybersecurity of IoT networks is essential for ensuring the safety, privacy, and reliability of the devices and systems they connect.
As IoT technology continues to evolve and become more pervasive, the need for effective cybersecurity measures will only increase.</p>
<br>
<h3>Reference</h3>
<p> <ul>
<li> O. Bhat, "Introduction to IoT," ResearchGate, Jan. 2019. <a href="https://www.researchgate.net/profile/Omkar-Bhat/publication/330114646_Introduction_to_IOT/links/5c2e31cf299bf12be3ab21eb/Introduction-to-IOT.pdf">https://www.researchgate.net/profile/Omkar-Bhat/publication/330114646_Introduction_to_IOT/links/5c2e31cf299bf12be3ab21eb/Introduction-to-IOT.pdf.</a></li>
<li>"What is IoT Cybersecurity?," Dataconomy, Feb. 2023. <a href="https://dataconomy.com/2023/02/what-is-iot-cybersecurity/#Risks_and_threats_to_IoT_cybersecurity">https://dataconomy.com/2023/02/what-is-iot-cybersecurity/#Risks_and_threats_to_IoT_cybersecurity.</a></li>
<li>"Introduction to Cybersecurity," IGI Global, 2021. <a href="https://www.igi-global.com/chapter/introduction-to-cyber-security/306856">https://www.igi-global.com/chapter/introduction-to-cyber-security/306856.</a></li>
</ul>
</p>
<br>
<button onclick="goBack()">Back</button>
</article>
<!-- About -->
<article id="about">
<h2 class="major">About Me</h2>
<span class="mepic"><img src="images/me.jpg" alt="" /></span><br><br>
<p>My name is Sulayman Alruwais.<br>I am 21 years old, Libyan student at Eastern Mediterranean University in North Cyprus. <br>My passion is to improve my
knowledge by experiencing new skills and I am a dependable person.
All my professions is done on Windows. <br><br>
<b>My hobbies:</b>
<ul>
<li>Swimming</li>
<li>Volleyball</li>
<li>Exploring new places</li>
</ul>
<b>Computer skills:</b>
<ul>
<li>Programming Languages:   C, C++, Java, MySQL, and Python.</li>
<li>Web development:   HTML, CSS, JavaScript, and php.</li>
<li>Problem solving.</li>
<li>System analysis.</li>
<li>Adobe animate.</li>
<li>Networking.</li>
<li>CyberSecurity.</li>
</ul>
<b>Languages:</b>
<ul>
<li> <b>Arabic:</b> as the mother language.</li>
<li><b>English:</b> is my second language.</li>
<li><b>Turkish:</b> I am not good enough at it "I know only the basic"</li>
</ul>
</p>
<br>
<button onclick="goBack()">Back</button>
</article>
<!-- Contact -->
<article id="contact">
<h2 class="major">Contact</h2>
<p>Sulayman Alruwais. <br>IT Student. <br>Phone: +90 5391057111
<br> e-mail: <a href="mailto:sulayman.alruwai@gmail.com">sulayman.alruwais@gmail.com</a> <br> Location: Karakol Mah. Magusa, North Cyprus. <br><br> Also you can find my media profiles, below by clicking on media icon:
<br>For more information, please you can leave a message. <hr> </p>
<form method="post" action="#">
<div class="fields">
<div class="field half">
<label for="name">Name</label>
<input type="text" name="name" id="name" />
</div>
<div class="field half">
<label for="email">Email</label>
<input type="text" name="email" id="email" />
</div>
<div class="field">
<label for="message">Message</label>
<textarea name="message" id="message" rows="4"></textarea>
</div>
</div>
<ul class="actions">
<li><input type="submit" value="Send Message" class="primary" /></li>
<li><input type="reset" value="Reset" /></li>
</ul>
</form>
<br>
<ul class="icons">
<li><a href="https://www.linkedin.com/in/sulayman-alruwais-563451261/" class="icon brands fa-linkedin"><span class="label">LinkedIn</span></a></li>
<li><a href="https://www.facebook.com/sliman.arwis" class="icon brands fa-facebook-f"><span class="label">Facebook</span></a></li>
<li><a href="https://instagram.com/sulayman_alruwais?igshid=YmMyMTA2M2Y=" class="icon brands fa-instagram"><span class="label">Instagram</span></a></li>
<li><a href="https://github.com/sulayman-IT" class="icon brands fa-github"><span class="label">GitHub</span></a></li>
</ul>
<br>
<button onclick="goBack()">Back</button>
</article>
<!-- Activity 1 -->
<article id="act1">
<h1>Scanning Activity</h1><br>
<p>The first activity is Scanning which I tested four command tools in Command Prompt to display Network configration of Windows oprating system.</p>
<br>
<figure>
<img src="images/ipconfig-1.png" alt="" class="act-img"><br><br>
<figcaption>Figure 1.1 - ipconfig</figcaption>
</figure> <br>
<figure>
<img src="images/ipconfig-2.png" alt="" class="act-img"><br><br>
<figcaption>Figure 1.2 - ipconfig</figcaption>
</figure>
<br>
<p><b>Figure 1.1</b> and <b>Figure 1.2</b> show 'ipconfig' comand-line tool that provides some information about network configration like IP Address, type, subnet mask, and
default gateway for all network adapter on the system.</p>
<br><br><br>
<figure>
<img src="images/ipconfigAll-1.png" alt="" class="act-img"><br><br>
<figcaption>Figure 2.1 - ipconfig /all</figcaption>
</figure> <br>
<figure>
<img src="images/ipconfigAll-2.png" alt="" class="act-img"><br><br>
<figcaption>Figure 2.2 - ipconfig /all</figcaption>
</figure>
<br>
<p><b>Figure 2.1</b> and <b>Figure 2.2</b> show the 'ipconfig /all' command-line tool that provides more detailed information about network configration,
containing the MAC address, DNS servers, and DHCP server information for all network adapters on the system. </p>
<br><br><br>
<figure>
<img src="images/tracert.png" alt="" class="act-img"><br><br>
<figcaption>Figure 3 - tracert</figcaption>
</figure><br>
<p><b>Figure 3</b> shows that I used 'tracert' command-line tool that is used to trace the route that packets take from your computer to a specified destination on the Internet.
I tested a website called 'www.a2hosting.com' to see what information gives me, for example the hops assigned from my computer to the website?, and other questions. <br>
Q1 - How many hops from your machine to your assigned website?<br>
There are 5 hops assigned from my laptop to www.a2hosting.com and over maximum of 30 hops. <br>
Q2 - Which step causes the biggest delay in the route? What is the average duration of that delay? <br>
The fourth hop causes the biggest delay, with average duration 19.3 ms. <br>
</p><br><br>
<figure>
<img src="images/nslookup.png" alt="" class="act-img"><br><br>
<figcaption>Figure 4 - nslookup</figcaption>
</figure><br>
<p><b>Figure 4</b> shows a command 'nslookup' network tool that is useful for troubleshooting network issues and verifying DNS information.
<br>It displays the Domain Name System(DNS), IP address, domain name, and other DNS records.
</p>
<hr>
<br>
<h3>Reflect</h3>
<p>Overall, in the activity 1 I have learned some command-line tools for scanning, and these commands are 'ipconfig', 'ipconfig /all', 'nslookup', and 'tracert'. <br>
I have learned how to get more information about networking configration as well as website info such as MAC address, IP address, DNS records, and the packets that is sent from my laptop to any assigned website.
Also it will help me to troubleshooting any network problem that may face me in the future.
</p>
<button onclick="goBack()">Back</button>
</article>
</article>
<!-- Activity 2 -->
<article id="act2">
<h1>HoneyPot atteck</h1>
<br>
<p>A honeypot is a security resource intentionally designed to be explored, exploited, or hacked to detect and gather data on attack trends, hacker motives,
and technical abilities. It is a detection and reaction tool, not a preventive one, and does not block specific intrusions or the transmission of viruses or worms.
Defenders can use the information gathered to construct stronger defences and countermeasures against future security threats.
Overall, honeypots are used to learn as much as possible about attack patterns and hacker behaviour.</p>
<figure>
<img src="images/act2-1.png" alt="" class="act-img"><br><br>
<figcaption>Figure 1</figcaption>
</figure><br>
<p><b>Figure 1</b> shows that I am on terminal in Lunix Kali oprating system to do Honeypot Attack, so first thing in normal user I wrote 'ifconfig' command to get inet IP, because I will need it later.</p>
<br>
<figure>
<img src="images/act2-2.png" alt="" class="act-img"><br><br>
<figcaption>Figure 2</figcaption>
</figure><br>
<p><b>Figure 2</b> shows from where I downloaded the honeypot tool which is 'PENTBOX'. So how did I install the PENTBOX? <br>
In Google I wrote "pentbox honeypot", then I went to GitHub website then scroll down then you will find the link like in <b>Figure 2</b>,
just copy the link and pasted in Kali Lunix terminal after you enter as a root user as in <b>Figure 3.1.</b></p><br>
<figure>
<img src="images/act2-3.png" alt="" class="act-img"><br><br>
<figcaption>Figure 3.1</figcaption>
</figure><br>
<figure>
<img src="images/act2-4.png" alt="" class="act-img"><br><br>
<figcaption>Figure 3.2</figcaption>
</figure><br>
<p><b>Figure 3.1</b>, after I pasted the link and pressed enter, it will be installed, so I type 'ls' command to list computer directories. Then I change the working directory to 'pentbox',
after that I ran it. <br><b>Figure 3.2</b> shows the running of PENTBOX.</p><br>
<figure>
<img src="images/act2-5.png" alt="" class="act-img"><br><br>
<figcaption>Figure 4.1</figcaption>
</figure><br>
<figure>
<img src="images/act2-6.png" alt="" class="act-img"><br><br>
<figcaption>Figure 4.2</figcaption>
</figure><br>
<figure>
<img src="images/act2-7.png" alt="" class="act-img"><br><br>
<figcaption>Figure 4.3</figcaption>
</figure><br>
<figure>
<img src="images/act2-8.png" alt="" class="act-img"><br><br>
<figcaption>Figure 4.4</figcaption>
</figure><br>
<p><b>Figure 4.1</b>, After I ran the PENTBOX, I went inside the PENTBOX to pentbox-1.8 directory. Then I used 'ls' command to see if 'pentbox.rb' is found or not. Then I ran it to start set up.<br>
<b>Figure 4.2</b> shows after I excuted it (pentbox.rb), it listed the options, which in honeypot should choose second option (Network tools), then it listed different type of attacks which we need is honeypot (number 3)
as it shown in Figure 4.3. Then in honeypot option I chose Manual configration (option 2), after that I insarted the port which it was 443 and the message "Cought You!! haha". <br>
<b>Figure 4.4</b> I saved the log instrusions and I did not change the name of the log file. Also I did not activate the beep() sound. after I set up the honeypot attack, you can see it is activated in <b>Figure 4.4</b>.</p>
<br>
<figure>
<img src="images/act2-9.png" alt="" class="act-img"><br><br>
<figcaption>Figure 5</figcaption>
</figure><br>
<p>Figure 5 shows the inet IP that we took in Figure 1, it was working before, but after the attck it had secure connection failed.</p>
<hr>
<h3>Reflect</h3>
<p>Honeypots can be a valuable addition to a comprehensive security strategy, it's important to carefully consider their benefits and drawbacks and use them appropriately.
They should not be relied upon as the sole means of security, but rather as one tool in a larger toolbox.<br>Overall, I have learned how to install the pentbox and set up the hoenypot detection
and how benefit it is, and I had not any learning difficulty about honeypot, installing pentbox, and set it up.</p>
<br>
<h3>Reference</h3>
<ul>
<li>M. Zulfiqar and M. Y. Javed, "Honeypots as a Tool for Detecting and Preventing Cyber Attacks," Webology, vol. 18, no. 2, pp. 79-96, 2021. [Online]. Available: <a href="https://www.webology.org/data-cms/articles/20220123051035pmWEB19370.pdf">https://www.webology.org/data-cms/articles/20220123051035pmWEB19370.pdf.</a></li>
</ul>
<br>
<button onclick="goBack()">Back</button>
</article>
<!-- Activity 3 -->
<article id="act3">
<h2>Distributed Denial-of-Service (DDoS) attack</h2>
<br>
<h3>What is DDoS attack?</h3>
<p>A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. <br>
DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. <br>
From a high level, a DDoS attack is like an unexpected traffic jam clogging up the highway, preventing regular traffic from arriving at its destination.</p>
<figure>
<img src="images/act3-1.png" alt="" class="act-img"><br><br>
<figcaption>Figure 1</figcaption>
</figure><br>
<p> <b>Figure 1</b>, The first thing to do is knowing the target IP address, so I used 'ping' with the URL address which I used a website called 'www.a2hosting.com', and this step done in Command Prompt as a system user. <br>
So the IP address of the website 'www.a2hosting.com' was 45.93.124.14.</p>
<br><br>
<figure>
<img src="images/act3-2.png" alt="" class="act-img"><br><br>
<figcaption>Figure 2</figcaption>
</figure><br>
<p><b>Figure 2</b>, after we knew the IP Address, in Kali Linux terminal I used 'sudo -i' to be a root user to have permission to all available commands and files on Linux.
Then I typed 'msfconsole' which is probably the most popular interface to the Metasploit Framework (MSF). It provides an "all-in-one" centralized console and allows you efficient access to virtually all of the options available in the MSF.</p>
<br><br>
<figure>
<img src="images/act3-3.png" alt="" class="act-img"><br><br>
<figcaption>Figure 3.1</figcaption>
</figure>
<br>
<figure>
<img src="images/act3-4.png" alt="" class="act-img"><br><br>
<figcaption>Figure 3.2</figcaption>
</figure><br>
<p><b>Figure 3.1</b>, after 'msfconsole' finished, I used 'use auxiliary/dos/tcp/synflood' to get access as I the instractor gave it to us, then
I used 'show options' to see the options and what the target port and host. <br><b>Figure 3.2</b>, Then after that I set RHost "rhost 'IP Address' " to the target website or server which is '45.93.124.14',
also I set RPort "rport '80 or 443'" we have two port and I chose port 80 as the instructor said in the lecture, then this I ran it.</p>
<br><br>
<figure>
<img src="images/act3-5.png" alt="" class="act-img"><br><br>
<figcaption>Figure 4</figcaption>
</figure><br>
<p><b>Figure 4</b>, So after I made it ready I went to Wireshar and I started it as you can see in the image. <br><b>How do you know if it is working or not?</b>
<br>Under the Destination you see the targeted website's IP address which means that it is working.</p>
<br><br>
<figure>
<img src="images/act3-6.png" alt="" class="act-img"><br><br>
<figcaption>Figure 5</figcaption>
</figure><br>
<p><b>Figure 5</b>, shows that the targeted website is not reachable. It may take some time to disable the website.</p>
<hr>
<h3>Reflect</h3>
<p>In this attack I have learned how to do flooding attack to a server, and it was a smooth learning, because it took my attention of how a hacker stop a website and it is my first attack I learned in this course.
Also it will help me to improve my knowledge about this attack and how to mitigate it. I have tried this attack 2 times rather than this one and it worked smoothly.</p>
<h3>Reference</h3>
<ul>
<li>Cloudflare. (n.d.). What is a DDoS attack? Retrieved from <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/</a></li>
<li> "Msfconsole - Metasploit Unleashed," OffSec. [Online]. Available: <a href="https://www.offsec.com/metasploit-unleashed/msfconsole/">https://www.offsec.com/metasploit-unleashed/msfconsole/.</a></li>
</ul>
<button onclick="goBack()">Back</button>
</article>
<!-- Activity 4 -->
<article id="act4">
<h2>Digitalization</h2>
<br>
<span class="image main"><img src="images/digitalisation-intro.png" alt="" /></span>
<br>
<h3>What is Digitalization?</h3>
<p>Digitalization is the process of leveraging digital technologies to transform a business model, creating new revenue streams and value-producing opportunities. This involves integrating digital tools and systems into various aspects of a business's operations, from management and communication to production and customer service.
In today's competitive landscape, digitalization has become essential for businesses to stay relevant and thrive. It enables organizations to adapt to rapidly changing market conditions, meet customer expectations, and optimize their processes for greater efficiency and productivity.
Using digitized information, digitalization is the process of making workflows and processes easier and more efficient. Especially in today's tech-driven world, it is crucial to adopt a digital culture in order to survive and succeed.
</p>
<h3>What are the security implications of the digital economy?</h3>
<p>In the digital economy, organizations rely heavily on information technology systems and networks to conduct their operations. This dependence introduces various security challenges. Cybersecurity threats, such as hacking, data breaches, and malware attacks, pose significant risks to digital infrastructure, sensitive data, and intellectual property.
The increased connectivity and interdependence of digital systems also amplify the potential for cascading effects and systemic risks. A single vulnerability or breach in one part of the digital ecosystem can have far-reaching consequences, impacting multiple organizations and sectors.
<br><br> Additionally, the digital economy's global nature raises concerns about international cyber espionage, cyber warfare, and state-sponsored attacks. Governments and malicious actors may seek to exploit vulnerabilities in digital systems for economic, political, or military gains, leading to potential destabilization and conflicts.
Privacy and data protection are crucial concerns in the digital economy. The collection, storage, and analysis of vast amounts of personal data raise ethical and legal issues. Unauthorized access or misuse of personal information can result in identity theft, financial fraud, and invasions of privacy.
<br><br> Moreover, the rapid pace of technological advancements in the digital economy creates challenges for security practices and regulations. As new technologies emerge, traditional security measures may become outdated, requiring continuous adaptation and investment in cybersecurity capabilities.
To address these security implications, organizations need to adopt a proactive and comprehensive approach to cybersecurity. This includes implementing robust security measures, conducting regular risk assessments, raising awareness among employees, and fostering collaboration between public and private sectors to share threat intelligence and best practices.</p>
<h3>Fully digital enterprise</h3>
<p>
A 'fully digital enterprise' refers to an organization that has embraced digital technologies across all aspects of its operations, processes, and interactions. It entails leveraging digital tools and platforms for communication, data storage and analysis, customer engagement, supply chain management, and more. Essentially,
a fully digital enterprise utilizes technology extensively to optimize its efficiency, productivity, and customer experience.
</p>
<h3>cyber Security challenges/concerns of fully digital enterprise</h3>
<p>
A fully digital enterprise introduces several cyber security challenges and concerns. Here are some key ones to consider:
<ol>
<li>Data breaches.</li>
<li>Insider threats.</li>
<li>Malware and ransomware attacks.</li>
<li>Third-party risks.</li>
<li>Cloud security challenges.</li>
<li>Regulatory compliance.</li>
<li>Social engineering attacks.</li>
<li>Internet of Things (IoT) vulnerabilities.</li>
</ol>
</p>
<h3>What are the cyber security challenges for a bricks and mortar SME wanting to become a digital enterprise?</h3>
<p>Low-security budget, lack of cyber-skills and increase in cyber-attacks can seriously impact SME's competitiveness and compromise event the value-chain they are connected to.
This is why is fundamental for SMEs to start taking the right steps to secure their business.</p>
<hr>
<h3>Reflect</h3>
<p>The digital economy offers numerous opportunities but also brings security challenges. A fully digital enterprise utilizes digital technologies across its operations, introducing risks such as data breaches, insider threats, malware attacks,
and regulatory compliance. Bricks and mortar SMEs transitioning to digital face challenges due to limited resources, integration issues, and increased attack surface. <br>
In my point of view, digitalization is very important for all companies even that the company is small(not international company), because if a company got hacked or some sensitive information got leaked, it may effect other company which also effect the economy.</p>
<h3>Reference</h3>
<ul>
<li>"Digitalization," WalkMe Glossary. [Online]. Available: <a href="https://www.walkme.com/glossary/digitalization/#digitalization-vs-digitization">https://www.walkme.com/glossary/digitalization/#digitalization-vs-digitization.</a> [Accessed: May 16, 2023].</li>
<li>L. Wei, Z. Zhou, H. Chen, and Y. Yang, "Security implications in the digital economy," in Proceedings of 2018 World Congress on Engineering (WCE), vol. 2, pp. 341-346, London, UK, 2018. Available: <a href="https://www.iaeng.org/publication/WCE2018/WCE2018_pp341-346.pdf">https://www.iaeng.org/publication/WCE2018/WCE2018_pp341-346.pdf</a></li>
<li>ENISA. (n.d.). SME Cybersecurity. Retrieved from <a href="https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity">https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity</a></li>
</ul>
<button onclick="goBack()">Back</button>
</article>
<!-- Activity 5 -->
<article id="act5">
<h2>OWASP Top 10 and IEEE Top 10 vulnerabilities</h2>
<hr><br>
<h2>OWASP Top 10 vulnerabilities</h2>
<span class="image main"><img src="images/OWASP.png" alt="" /></span>
<p><b>What is OWASP?</b><br>
The Open Worldwide Application Security Project (OWASP) is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. The OWASP provides free and open resources. It is led by a non-profit called The OWASP Foundation.
The OWASP Top 10 - 2021 is the published result of recent research based on comprehensive data compiled from over 40 partner organizations.
<br>But in this activity, we will discuss OWASP top 10 vulnerabilities 2023:
</p>
<ol>
<li>
<b>Broken Access Control</b>
<dd>During app development, access controls are applied that prohibit users from retrieving the information out of their given permission. Failure to perform efficiently can lead to unauthorized information disclosure, data modification, destruction of all data and many other damages. When an application evolves with time and numerous features are loaded to it, failure can occur and this can result in fallout for the application's security.
Broken Access Control in any application or website must be prevented at all cost.
It is among the commonly faced OWASP 2023 vulnerabilities.</dd>
</li>
<br>
<li>
<b>Cryptographic Failures</b>
<dd>Poor use of cryptography and algorithm are responsible for a series of threats that are known as Cryptographic failures. It is important to use encrypted connections to application like SFTP, HTTPS, SSH, etc while carrying out any configuration or code changes.
This vulnerability can expose sensitive data such as passwords, business records,
credit card information, email addresses, patient health records, or other personal user data. To prevent this, all data should be stored with the recommended hashing algorithms.</dd>
</li>
<br>
<li>
<b>Injection</b>
<dd>
Injection is one of the oldest vulnerability that can lead to data loss, data theft, service denial, etc and in worst scenario can compromise the full system. Injection attacks, especially SQL Injections (SQLi attacks) and Cross-site Scripting (XSS),
are most dangerous and widespread weakness of any application.
Other than these, there are several other types of Injections that a web developer should look out for. Using a safe API and positive server-side input validation can help in preventing Injections.
</dd>
</li>
<br>
<li>
<b>Insecure Design</b>
<dd>To keep application free of security gaps, it is recommended that developers use safe design patterns and securely created threat modeling while designing.
A secure application can be build using secured component library, tooling and methodology. Implementation of ineffective control design can lead to different weaknesses termed as
Insecure Design. It is suggested to determine the level of security design before beginning the app development to prevent Insecure Design vulnerability.</dd>
</li>
<br>
<li>
<b>Security Misconfiguration</b>
<dd>Inaccurately or insecurely configured security controls can cause Security
Misconfiguration vulnerability and put the system and data to risk. Unnecessary features enabled or installed, outdated software, etc can also cause Security Misconfiguration.
This threat can impact any layer of the application stack, cloud or network, leaving important information to expose. It can be prevented by implementing secure installation process.
Using an automated process to verify the effectiveness of the configurations and settings in all environments is also recommended.</dd>
</li>
<br>
<li>
<b>Vulnerable and Outdated Components</b>
<dd>If the components used in the development of a website or application is outdated or is vulnerable itself, it can compromise the whole application. This is known as Vulnerable and Outdated Components vulnerability.
A developer should also always know the versions of components being used and should perform regular scan for vulnerabilities to keep problems at bay. As a protective measure, remove unnecessary features, unused dependencies,
components, files and documentation from time to time.</dd>
</li>
<br>
<li>
<b>Identification and Authentication Failures</b>
<dd>Before accessing any protected site, the application must keep a check on user's identity, authentication, and session management. These things are important for protection against authentication-related attacks or can else lead to Identification and Authentication Failures vulnerability.
With the introduction of two-factor authentication, the number of failures has reduced but is still too frequent to be listed in the OWASP Top 10 vulnerabilities 2023. Limiting failed login attempts and generating a new random session ID at every login can further prevent the issue.</dd>
</li>
<br>
<li>
<b>Software and Data Integrity Failures</b>
<dd>Code and infrastructure that does not protect against integrity violations can lead to Software and data integrity failures. It is therefore important to verify the installed packages on your system and make sure that the data is from a reliable source and has not been altered at any stage.
Implementing libraries and dependencies, software supply chain security tool, and review process for code and configuration changes are other ways of preventing this vulnerability.</dd>
</li>
<br>
<li>
<b>Security Logging and Monitoring</b>
<dd>Security logging and monitoring are vital to the maintenance of a secure infrastructure.
Viewing the logs regularly can be helpful in acting fast in case any potentially dangerous activity is noticed. On the other hand, insufficient monitoring of log activities can lead to a bunch of issues collectively termed as Security logging and monitoring vulnerability.
Depending on the risk of the application, protective measures must be applied to eliminate any risk as soon as possible.</dd>
</li>
<br>
<li>
<b>Server-Side Request Forgery</b>
<dd>Server-Side Request Forgery (SSRF) occurs when a web application procures a distant resource without validating the URL supplied by the user. The attacker can send a crafted request to an unexpected destination, even if protected by a firewall or VPN.
Both frequency and severity of this vulnerability has increased with time. To protect an application against SSRF, all the data entered should be checked carefully and each URL scheme should be checked against the allowed list.</dd>
</li>
</ol>
<br>
<h2>IEEE Top 10 vulnerabilities</h2>
<span class="image main"><img src="images/IEEE.png" alt="" /></span>
<p><b>What is IEEE?</b><br>
The IEEE (Institute of Electrical and Electronics Engineers) describes itself as "the world's largest technical professional society -- promoting the development and application of electrotechnology and allied sciences for the benefit of humanity,
the advancement of the profession, and the well-being of our members."
</p>
<hr>
<h3>Reflect</h3>
<p>
In this activity, I have done researches about both OWASP top 10 vulnerabilities(2023 version) and IEEE top 10 vulnerabilities(2021 version), the comeout of my researches is that for the IEEE, I did not found the source and some resources gave me the same as the OWASP top 10.
<br>So, I will just reflect on the OWASP. As I mentioned above about the top 10 vulnerabilities of OWASP, before I made the research about it, I thought some of the vulnerabilities is not that important such as <b>"Vulnerable and Outdated Components"</b>, I found it in the top 10.
</p>
<h3>Reference</h3>
<ul>
<li>"The Open Worldwide Application Security Project (OWASP)," Wikipedia, The Free Encyclopedia. [Online]. Available: <a href="https://en.wikipedia.org/wiki/OWASP">https://en.wikipedia.org/wiki/OWASP</a>. [Accessed: May 16, 2023].</li>
<li>"OWASP Top 10 vulnerabilities" <a href="https://www.edudwar.com/owasp-top-10-vulnerabilities/">https://www.edudwar.com/owasp-top-10-vulnerabilities/</a></li>
<li>"The IEEE (Institute of Electrical and Electronics Engineers)," TechTarget. [Online]. Available: <a href="https://www.techtarget.com/whatis/definition/IEEE-Institute-of-Electrical-and-Electronics-Engineers">https://www.techtarget.com/whatis/definition/IEEE-Institute-of-Electrical-and-Electronics-Engineers</a>. [Accessed: May 16, 2023].</li>
</ul>
<button onclick="goBack()">Back</button>
</article>
<!-- Activity 6 -->
<article id="act6">
<h2>vulnerability database</h2>
<br>
<figure>
<img src="images/act6-1.png" alt="" class="act-img"><br><br>
<figcaption>Figure 1</figcaption>
</figure><br>
<figure>
<img src="images/act6-2.png" alt="" class="act-img"><br><br>
<figcaption>Figure 2</figcaption>
</figure><br>
<figure>
<img src="images/act6-3.png" alt="" class="act-img"><br><br>
<figcaption>Figure 3</figcaption>
</figure><br>
<figure>
<img src="images/act6-4.png" alt="" class="act-img"><br><br>
<figcaption>Figure 4</figcaption>
</figure><br>
<br>
<h3>Reflect</h3>
<p>
During the lab activity, we focused on exploring the Vulnerability Database using the Metasploit framework.
This framework is a powerful tool that is commonly utilized by both cybersecurity professionals and malicious attackers. Unfortunately,
I found the activity to be quite confusing as I lacked prior knowledge in this area. I have included some screenshots from the activity in Figures 1, 2, 3, and 4. Despite my confusion,
I recognize the significance of understanding and addressing vulnerabilities to ensure the security of systems and applications.
</p>
<button onclick="goBack()">Back</button>
</article>
<!-- Activity 7 -->
<article id="act7">
<h2>Arduino uno seminar</h2>
<br>
<p>In this seminar, I have learned about Arduino uno and how it works and what is the main components and
which application they use to develop it and which programming language they use.
</p>
<figure>
<img src="images/act7-2.JPG" alt="" class="act-img"><br><br>
<figcaption>Figure 1</figcaption>
</figure><br>
<figure>
<img src="images/act7-3.JPG" alt="" class="act-img"><br><br>
<figcaption>Figure 2</figcaption>
</figure><br>
<figure>
<img src="images/act7-4.JPG" alt="" class="act-img"><br><br>
<figcaption>Figure 3</figcaption>
</figure><br>
<figure>
<img src="images/act7-5.jpg" alt="" class="act-img"><br><br>
<figcaption>Figure 4</figcaption>
</figure><br>
<figure>
<img src="images/act7-6.jpg" alt="" class="act-img"><br><br>
<figcaption>Figure 5</figcaption>
</figure><br>
<figure>
<img src="images/act7-7.JPG" alt="" class="act-img"><br><br>
<figcaption>Figure 6</figcaption>
</figure><br>
<br>
<h3>Reflect</h3>
<p>This seminar, organized by Professor Beran on May 16th, 2023, which it was about the Arduino Uno microcontroller. The guest speaker, Ali Uker, began by providing an explanation of what the Arduino Uno is (refer to 'Figure 2').
He then proceeded to discuss the main components of the microcontroller and showcased some of his own real-world projects, including Traffic Lights (see 'Figure 4' and 'Figure 5'). I was interested about it because as I mentioned it was about real-world project and it is an important microcontroller broad.
<br>Overall, the seminar was informative, covering the basics of the Arduino Uno microcontroller and its main components. However, it would have been even more valuable if larger-scale real-world projects were prepared and explained.</p>
<button onclick="goBack()">Back</button>
</article>
<!-- Activity 8 -->
<article id="act8">
<h2>Best Elevator Project</h2>
<br>
<table class="ele">
<tr>
<th>Project</th>
<td>Best Elevator</td>
</tr>
<tr>
<th>Objectives</th>
<td>
<ul>
<li> Increase customer loyalty.</li>
<li>Improve service maintenance and predictive maintenance.</li>
<li>Manage spare parts inventory more efficiently.</li>
<li>Improve product design and technician training.</li>
<li>Improve uptime and field service efficiency.</li>
<li>Allocate scarce service technicians more efficiently.</li>
<li>Communicate more effectively with suppliers.</li>
</ul>
</td>
</tr>
<tr>
<th>Increase customer loyalty</th>
<td>Sensor data are able to predict issues allowing to take proactive measures before these turn into a failure and ultimately resulting into machine downtime and customer frustration.</td>
</tr>
<tr>
<th>Improve service maintenance and predictive maintenance</th>
<td>By Monitoring Operating Conditions: Like the IoT devices in other building systems, elevator IoT devices make gathering data simple and effortless.
an IoT-enabled elevator might gather data in any of these areas: <br>
Critical safety circuits, Load weighing, Number of trips, Number of door cycles, Wait times, Traffic trends, and Ride analysis.</td>
</tr>
<tr>
<th>Manage spare parts inventory more efficiently</th>
<td>An IoT-enabled elevators can automatically detect when specific parts are malfunctioning or need replacement. This information can be sent to the inventory management system in real-time,
triggering automatic reordering or generating alerts to ensure spare parts availability.</td>
</tr>
<tr>
<th>Improve product design and technician training</th>
<td>An IoT devices are a powerful tool for orchestrating maintenance operations. Their ability to analyze large streams of performance data and predict future requirements eliminates the need for manual processes.</td>
</tr>
<tr>
<th>Improve uptime and field service efficiency</th>
<td>With IoT sensors constantly monitoring elevator performance, service technicians can receive real-time alerts and notifications regarding any potential issues or malfunctions.
This enables them to respond promptly, minimizing downtime and improving overall elevator uptime. </td>
</tr>
<tr>
<th>Allocate scarce service technicians more efficiently</th>
<td>IoT data can provide insights into the performance of different elevators, helping companies identify elevators that require frequent maintenance or have higher failure rates.
</tr>
<tr>
<th>Communicate more effectively with suppliers</th>
<td>IoT-enabled elevators can facilitate seamless communication with suppliers and manufacturers. Real-time data on elevator performance and maintenance needs can be shared with suppliers automatically,
enabling them to proactively address issues and ensure timely delivery of spare parts. </td>
</tr>
</table>
<h3>Reflect</h3>
<p><b>Best Elevator Project</b> is a project that develops elevators to be more beneficial by using and implementing IoT devices, the main goals for this project are to increase customer loyalty, improve maintenance, prodect design, technician traing, and somr others.
<br>At fisrt, I thought that elevators does not need that much of IoT devices and sensors, so after I made researches about it, I found out that elevators contain many IoT sensors. Overall after the prefessor explained about it and told us to do researches, which it was very beneficial and it changed my thought about elevators.</p>
<h3>Reference</h3>
<ul>
<li>Fieldcode. (n.d.). "IoT Elevator Service Use Case." [Online]. Available: <a href="https://fieldcode.com/shared/use-cases/uca-001_iot_elevator_service/uca-001_iot_elevator_service_v5.pdf">https://fieldcode.com/shared/use-cases/uca-001_iot_elevator_service/uca-001_iot_elevator_service_v5.pdf</a></li>
<li>Author(s). "Predictive Maintenance: Top 10 Ways IoT is Changing Elevators." Buildings, vol. 106, no. 8, pp. 48-54, August 2021. [Online]. Available: <a href="https://www.buildings.com/vertical-transportation/article/10186013/predictive-maintenance-top-10-ways-iot-is-changing-elevators.">https://www.buildings.com/vertical-transportation/article/10186013/predictive-maintenance-top-10-ways-iot-is-changing-elevators.</a></li>
<li>Author(s). "Guide: IoT Solutions for Smart Elevator Management." Intuz Blog, May 2019. [Online]. Available: <a href="https://www.intuz.com/blog/guide-iot-solutions-for-smart-elevator-management.">https://www.intuz.com/blog/guide-iot-solutions-for-smart-elevator-management.</a></li>
<li>Barkai, Joe. "An Elevator Pitch: IoT Improves Elevator Service." Joe Barkai Blog, February 2018. [Online]. Available: <a href="http://joebarkai.com/an-elevator-pitch-iot-improves-elevator-service/.">http://joebarkai.com/an-elevator-pitch-iot-improves-elevator-service/.</a></li>
</ul>
<button onclick="goBack()">Back</button>
</article>
<!-- Elements
<article id="elements">
<h2 class="major">Elements</h2>
<section>
<h3 class="major">Text</h3>
<p>This is <b>bold</b> and this is <strong>strong</strong>. This is <i>italic</i> and this is <em>emphasized</em>.
This is <sup>superscript</sup> text and this is <sub>subscript</sub> text.
This is <u>underlined</u> and this is code: <code>for (;;) { ... }</code>. Finally, <a href="#">this is a link</a>.</p>
<hr />
<h2>Heading Level 2</h2>
<h3>Heading Level 3</h3>
<h4>Heading Level 4</h4>
<h5>Heading Level 5</h5>
<h6>Heading Level 6</h6>
<hr />
<h4>Blockquote</h4>
<blockquote>Fringilla nisl. Donec accumsan interdum nisi, quis tincidunt felis sagittis eget tempus euismod. Vestibulum ante ipsum primis in faucibus vestibulum. Blandit adipiscing eu felis iaculis volutpat ac adipiscing accumsan faucibus. Vestibulum ante ipsum primis in faucibus lorem ipsum dolor sit amet nullam adipiscing eu felis.</blockquote>
<h4>Preformatted</h4>
<pre><code>i = 0;
while (!deck.isInOrder()) {
print 'Iteration ' + i;
deck.shuffle();
i++;
}
print 'It took ' + i + ' iterations to sort the deck.';</code></pre>
</section>
<section>
<h3 class="major">Lists</h3>
<h4>Unordered</h4>
<ul>
<li>Dolor pulvinar etiam.</li>
<li>Sagittis adipiscing.</li>
<li>Felis enim feugiat.</li>
</ul>
<h4>Alternate</h4>
<ul class="alt">
<li>Dolor pulvinar etiam.</li>
<li>Sagittis adipiscing.</li>
<li>Felis enim feugiat.</li>
</ul>
<h4>Ordered</h4>
<ol>
<li>Dolor pulvinar etiam.</li>
<li>Etiam vel felis viverra.</li>
<li>Felis enim feugiat.</li>
<li>Dolor pulvinar etiam.</li>
<li>Etiam vel felis lorem.</li>
<li>Felis enim et feugiat.</li>
</ol>
<h4>Icons</h4>
<ul class="icons">
<li><a href="#" class="icon brands fa-twitter"><span class="label">Twitter</span></a></li>
<li><a href="#" class="icon brands fa-facebook-f"><span class="label">Facebook</span></a></li>
<li><a href="#" class="icon brands fa-instagram"><span class="label">Instagram</span></a></li>
<li><a href="#" class="icon brands fa-github"><span class="label">Github</span></a></li>
</ul>
<h4>Actions</h4>
<ul class="actions">
<li><a href="#" class="button primary">Default</a></li>
<li><a href="#" class="button">Default</a></li>
</ul>
<ul class="actions stacked">
<li><a href="#" class="button primary">Default</a></li>
<li><a href="#" class="button">Default</a></li>
</ul>
</section>
<section>
<h3 class="major">Table</h3>
<h4>Default</h4>
<div class="table-wrapper">
<table>
<thead>
<tr>
<th>Name</th>
<th>Description</th>
<th>Price</th>
</tr>
</thead>
<tbody>
<tr>
<td>Item One</td>
<td>Ante turpis integer aliquet porttitor.</td>
<td>29.99</td>
</tr>
<tr>
<td>Item Two</td>
<td>Vis ac commodo adipiscing arcu aliquet.</td>
<td>19.99</td>
</tr>
<tr>
<td>Item Three</td>
<td> Morbi faucibus arcu accumsan lorem.</td>
<td>29.99</td>
</tr>
<tr>
<td>Item Four</td>
<td>Vitae integer tempus condimentum.</td>
<td>19.99</td>
</tr>
<tr>
<td>Item Five</td>
<td>Ante turpis integer aliquet porttitor.</td>
<td>29.99</td>
</tr>
</tbody>
<tfoot>
<tr>
<td colspan="2"></td>
<td>100.00</td>
</tr>
</tfoot>
</table>
</div>
<h4>Alternate</h4>
<div class="table-wrapper">
<table class="alt">
<thead>
<tr>
<th>Name</th>
<th>Description</th>
<th>Price</th>
</tr>
</thead>
<tbody>
<tr>
<td>Item One</td>
<td>Ante turpis integer aliquet porttitor.</td>
<td>29.99</td>
</tr>
<tr>
<td>Item Two</td>
<td>Vis ac commodo adipiscing arcu aliquet.</td>
<td>19.99</td>
</tr>
<tr>
<td>Item Three</td>
<td> Morbi faucibus arcu accumsan lorem.</td>
<td>29.99</td>
</tr>
<tr>
<td>Item Four</td>
<td>Vitae integer tempus condimentum.</td>
<td>19.99</td>
</tr>
<tr>
<td>Item Five</td>
<td>Ante turpis integer aliquet porttitor.</td>
<td>29.99</td>
</tr>
</tbody>
<tfoot>
<tr>
<td colspan="2"></td>
<td>100.00</td>
</tr>
</tfoot>
</table>
</div>
</section>
<section>
<h3 class="major">Buttons</h3>
<ul class="actions">
<li><a href="#" class="button primary">Primary</a></li>
<li><a href="#" class="button">Default</a></li>
</ul>
<ul class="actions">
<li><a href="#" class="button">Default</a></li>
<li><a href="#" class="button small">Small</a></li>
</ul>
<ul class="actions">
<li><a href="#" class="button primary icon solid fa-download">Icon</a></li>
<li><a href="#" class="button icon solid fa-download">Icon</a></li>
</ul>
<ul class="actions">
<li><span class="button primary disabled">Disabled</span></li>
<li><span class="button disabled">Disabled</span></li>
</ul>
</section>
<section>
<h3 class="major">Form</h3>
<form method="post" action="#">
<div class="fields">
<div class="field half">
<label for="demo-name">Name</label>
<input type="text" name="demo-name" id="demo-name" value="" placeholder="Jane Doe" />
</div>
<div class="field half">
<label for="demo-email">Email</label>
<input type="email" name="demo-email" id="demo-email" value="" placeholder="jane@untitled.tld" />
</div>
<div class="field">
<label for="demo-category">Category</label>
<select name="demo-category" id="demo-category">
<option value="">-</option>
<option value="1">Manufacturing</option>
<option value="1">Shipping</option>
<option value="1">Administration</option>
<option value="1">Human Resources</option>
</select>
</div>
<div class="field half">
<input type="radio" id="demo-priority-low" name="demo-priority" checked>
<label for="demo-priority-low">Low</label>
</div>
<div class="field half">
<input type="radio" id="demo-priority-high" name="demo-priority">
<label for="demo-priority-high">High</label>
</div>
<div class="field half">
<input type="checkbox" id="demo-copy" name="demo-copy">
<label for="demo-copy">Email me a copy</label>
</div>
<div class="field half">
<input type="checkbox" id="demo-human" name="demo-human" checked>
<label for="demo-human">Not a robot</label>
</div>
<div class="field">
<label for="demo-message">Message</label>
<textarea name="demo-message" id="demo-message" placeholder="Enter your message" rows="6"></textarea>
</div>
</div>
<ul class="actions">
<li><input type="submit" value="Send Message" class="primary" /></li>
<li><input type="reset" value="Reset" /></li>
</ul>
</form>
</section>
</article>-->
</div>
<!-- Footer -->
<footer id="footer">
<p class="copyright">© Sulayman Alruwais. Design: <a href="#about">Sulayman Alruwais</a>.</p>
</footer>
</div>
<!-- BG -->
<div id="bg"></div>
<!-- Scripts -->
<script src="assets/js/jquery.min.js"></script>
<script src="assets/js/browser.min.js"></script>
<script src="assets/js/breakpoints.min.js"></script>
<script src="assets/js/util.js"></script>
<script src="assets/js/main.js"></script>
<script>
function goBack() {
window.history.back();
}