...what exactly is a port expander ,the author of this essay asks? A port expander is basically a device, that can be connected internal through the motherboard or an external connector, witch allows you to connect multiple devices to a single port. The way the port expanders works is it literally act as an add on for other devices. Think of a port expander like a modern surge protector. A surge protector has a single prong on the end of it to plug into one outlet but the surge protector also has several connector points on its other end to expands the one electrical unit to about several different units. This is the same idea for a port expander. The port expander has on connector port that goes into the receiving computer port and on the other end of that connector port are about several ports that can be used with the single connector port. Port expanders are very much so universal, simply because the ports themselves are universal so there aren't any specific expanders, or another that port expanders are called is a hub, for specific computers and they are generic devices that will work with any computer. So with ports there are some good reasons or advantages for them but just as there is good you also have the bad or disadvantages for them as well. One disadvantage or the major disadvantage would be because that one port is be shared with so many devices it will definitely cause slower connection speed between transmitting information between the ports. To offset that disadvantage...
Words: 351 - Pages: 2
...The problem is a bad VGA port on the computer or monitor. I came up with the problem by gathering information from the customer, identifying symptoms by checking the computer and monitor and determining if anything has changed by asking the customer. Information – Problem started 2 years after customer purchased computer and monitor. Desktop computer powers on, but does not display on external monitor. VGA ports are being used on computer and Monitor. Computer and monitor have DVI ports. Identifying symptoms – Monitor display is blank when computer is powered on. Determining if anything has changed – No changes have occurred since purchase of computer and monitor. Step 2: Establish a theory of probable cause. The probable cause of the problem...
Words: 485 - Pages: 2
...1.why is all data stored in a computer in binary form? Computers are only able to read and store data in binary form, 1 or 0, on or off, yes or no, voltage or none. Binary is the simplest way to manage information. 2. What are the four primary functions of hardware? input, output, PROCESS, and Storage 3. What are the two main input devices and two main output devices? the mouse, keyboard, printer, and monitor. 4. What three things do electronic hardware devices need in order to function? power, ground return, and load. 5. How many bits are in a byte? There are eight bits in a byte. 6. What is the purpose of an expansion slot on a motherboard? Expansion slots on a motherboard are designed to accept peripheral cards that add functionality to a computer system, such as a video or a sound card. 7. Which component on the motherboard is used primarily for processing? The CPU 8. Name the two main CPU manufacturers. Intel and AMD 9. Order the following ports according to speed, placing the fastest port first: FireWire, eSATA, USB. eSATA is faster than FireWire and firewire is faster than USB. 10. What are two other names for the system bus? The PCI bus, and the PCI express bus 11. What type of output does an S/PDIF port provide? Digital output 12. Why is an SSD hard drive more reliable under rugged conditions than an IDE hard drive? SSD hard drives have no moving parts that can disintegrate under rugged conditions. Because SDD drives have...
Words: 1535 - Pages: 7
...Vulnerability scanning Lab #2 1. Zenmap is a tool used for scanning remote computers. Zenmap can retrieve the following information from the target machine: Type of operating system List of open ports Mac Address A hacker plans to carry out an attack on a company network. In order to carry out the attack, the attacker will require some basic information about the target machine on the company network. Zenmap could be used to probe the network and target machine and retrieve basic information needed to stage an attack. 2. Nessus 3. Before the reconnaissance step it is important to formulate a plan. You would also require some information such as host IP address in order to probe the target machine using tools like Nessus. 4. CVE listing is a publicly available and free list of standardized identifiers for common computer vulnerabilities. MITRE is a not-for-profit organization responsible for hosting CVE. MITRE operates research and development centers sponsored by the federal government. 5. Zenmap is capable of identifying operating systems that are present on IP server and workstation. This can be achieved by using the Intense Scan option. 6. Knowing that the target host is running Windows XP workstation gives better sense of what kind of vulnerabilities to expect. You can focus the scan on Windows using some plugins in Nessus and concentrate on services that run on the windows workstation. You can also look out for unpatched and outdated...
Words: 493 - Pages: 2
...conclusion ports and connectors I learned how to identify the different type of ports and the connectors which are used for those ports. Also know which devices use those particular ports and connectors. For ports there are serial, parallel, and game ports. For devices there are mouse’s and keyboards. There is also a NIC (network interface card). To connect to video there is VGI, DVI and S-Video. New port and connectors are the USB1 and USB2 which come with connector A and connector B. There are also the SCSI connectors a narrow 50 pin and a wide 68 pin. IEEE 1394 uses serial communication and will replace SCSI in the future. Lastly for multimedia we have the earphones, microphone and speaker jacks which come color coded. * * Serial, Parallel, Game ports | * USB(Universal Serial Bus) | * Mouse and Keyboard | * SCSI | * NIC( Network Interface Card) | * IEEE 1394 | * Modem | * Multimedia | * Video | | * Serial port: a socket that can be used for connecting devices that send data one bit at a time; often used for connecting the mouse or a modem. * Parallel port: a socket that can be used for connecting devices that send and receive data at more than one bit at a time; often used for connecting printers. * USB: an external serial bus interface standard for connecting peripheral devices to a computer. Up to 127 devices simultaneously connected to computer. * SCSI: a standard for computer interface ports featuring faster...
Words: 810 - Pages: 4
...Identifying I/O Ports and Devices •Serial Port: A serial communication physical interface through which information transfers in or out one bit at a time. Once very commonly used for connecting an external modem or mouse to a PC, very few new computers will come with one unless specifically ordered that way. •PS/2 Connector: The most commonly used connection for keyboards and mice to a PC compatible computer system. •Parallel Port: Sends several data signals simultaneously over several parallel channels (as opposed to the Serial Port). Once the most common interface for connecting a printer to a computer, these are also now non-existent in a modern PC. •Game Port: The traditional connector for video game input devices on x86-based PCs. •Ethernet/RJ45: Most people consider this their network jack, internet connection or hardline. These ports are typically used to connect twisted pair (more commonly referred to as Cat5e) cable (or we could just say, "Plug in a network cable that gets you onto the internet"). •Modem/RJ11: A physical interface often used for terminating telephone wires. Once standard issue with every desktop PC and laptop, new computers will often be without a modem/RJ-11 port unless specifically ordered that way. •VGA Port: Acronym for Video Graphic Array. The most common connection for external monitors, but not necessarily the most preferred as it carries an analog signal. •S-Video: Separate Video (not Super Video) carries the video data as two separate...
Words: 902 - Pages: 4
...1.07- In this video clip it explains the ports you would use to connect different types of devices to computers. It explains the ports you would use to connect a USB, printer, speakers, microphone, and an external hard drive. It talks about the features of serial, parallel, and game ports. Also explains what has changed about mouse and keyboards connections. They describe what a Network interface Card is and talks about the slowest way to connect to the internet. It explains the two types of video output ports are commonly on a computer. They go over what a USB is and its features. Key Points: * Serial, Parallel, and Game ports have been mostly replaced by USB ports * A dialup modem is the slowest possible method of connecting to the internet * A Network Interface Card connects your computer to local networks, or the Internet * Early mouse used serial connector * Early keyboard used bulky 5-pin din connector * Modern keyboard and mouse use Ps/2 technology, which is a much smaller 6-pin din connector or USB/wireless connection * Modern computer comes with 2 types of video output ports (VGA,DVI) * Microphone, earphones, speakers are usually located in back of computer Key Terms: * Serial ports- is a general-purpose interface that can be used for almost any type of device. (Male, 9 or 25 pins, transmits data 1 bit at a time) * Parallel ports- interface for connecting an external device such as a printer. (female, 25pins, transmits...
Words: 873 - Pages: 4
...doc I/O Ports, Devices and Descriptions Identifying the ports: 1/8-Inch Audio Mini-Jack. The 1/8-inch audio mini-jack is used by sound cards and motherboard-integrated sound for speakers, microphone, and line-in jacks, To avoid confusion, most recent systems and sound cards use the PC99 color coding listed as follows: * Pink—Microphone in * Light Blue—Line in * Lime Green—Stereo/headphone out * Brown—Left to right speaker * Orange—Subwoofer USB Port Types, Speeds, and Technical Details There are three standards types of USB ports you need to know: * USB 1.1 * USB 2.0 (also called Hi-Speed USB) * USB 3.0 (also called SuperSpeed USB) VGA VGA is an analog display standard. DVI The DVI port is the current standard for digital LCD monitors. The DVI port comes in two forms: DVI-D supports only digital signals, and is found on digital LCD displays. HDMI Video cards and systems with integrated video that are designed for home theater use support a unique type of digital video standard known as High-Definition Multimedia Interface (HDMI). PS/2 (Mini-DIN) PS/2 ports (also referred to as Mini-DIN ports) are used by PS/2 keyboards, mice, and pointing devices. Parallel (LPT) The parallel port, also known as the LPT (Line Printer) port, was originally designed for use with parallel printers. Ethernet Port (RJ45) An Ethernet port is a jack or socket on a computer that allows the use of an Ethernet connector. These ports are essential...
Words: 435 - Pages: 2
...Kethcart INFOST-491 SEC-OL Exercises 1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined? a. A paper titled the “Rand Report R-609” was sponsored by the Department of Defense and initiated the movement toward security that went beyond protecting physical locations. It attempted to define multiple controls and mechanisms necessary for the protection of a multilevel computer system; identifying the role of management and policy issues in computer security. This report/paper significantly expanded the scope of computer security to include the following: securing the data, limiting random and unauthorized access to said data, and involving personnel from multiple levels of the organization in matters pertaining to information security. 3. Consider the information stored on your personal computer. For each of the terms listed, find an example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit. a. Threat: i. Theft of Media b. Threat Agent: ii. Hacker (Ex: Ima Hacker) c. Vulnerability: iii. Unprotected system port d. Exposure: iv. Using a website monitored by malicious hackers, reveals a vulnerability – i.e. Unprotected system port e. Risk: v. Low level risk – The probability that theft of media will occur is...
Words: 790 - Pages: 4
...Sitting at a computer 12 hours a night, can take a toll on someone. Now imagine you are searching for predators, predators that prey on our children. It’s a terrifying thought, but that’s what I do. A Pedophile is a person who is sexually attracted to children. You start in a simple chatroom, and a lie, and from there opens up a whole new world. I came into work as a 32 year old man, Steve, to imitate a 14 year old female, Stacie. It is believed that more than half a million pedophiles are online every day. Before the Internet, pedophiles physically had to go to parks, zoos, typical places children are interested in. Thanks to the popularity of the Internet, pedophiles have taken their victims from approximately one or two a day, to an unlimited number. The U.S. Department of Justice stated “one in five children (10 to 17 years old) receives unwanted sexual solicitations online.” In order to be considered a pedophile you must fit into certain categories, you must experience sexual fixation, fantasizing, or must have sexual activities with a preadolescent child for at least six months of the year. In order to be considered a pedophile, you have to be 16 years or older and the victim must be a minimum of five years younger. Pedophiles are broken down into three categories, a secretive pedophile, a child pornography collector, and an active file. The secretive pedophile may look completely normal, may even be married, have a few kids of their own, and could possibly never sexually...
Words: 1032 - Pages: 5
...downloads…………………………………………………………….………….9 Security Plan……………………………………………………………………………………………….. 9-11 Steps to remove evidence……………………………………………………………………………. 11 References:…………………………………………………………………………………………………..12 Abstract This paper list and describe the seven steps of information gathering and describe some of the most popular reconnaissance tools while explaining the benefits and limitations of each. Included as well is the method to crack passwords on Windows, Linux, and Mac. There is also a password cracker tool that was downloaded on my home computer that describes the steps and outcomes. Least but not last, a security plan is also included in this project and the steps to remove evidence of an attack on a network. Define the seven-step information gathering process • Information gathering is divided into seven steps. These steps include gathering information, determining the network range, identifying active machines, finding open ports and access points, OS fingerprinting, fingerprinting services, and mapping the network. Define footprinting • Footprinting is the process of acquiring an increasing number of data regarding a precise network environment, typically for the purpose of finding ways to encroach into the environment. Locate the network range • Locating the network range is desired to be familiar with what addresses can be targeted and are obtainable for extra scanning and analysis. Identify active machines...
Words: 2645 - Pages: 11
...Sarbanes-Oxley Act (SOX) – Passed in 2002, the SOX requires publicly traded companies to submit accurate and reliable financial reporting. This law does not require securing private information, but it does require security controls to protect the confidentiality and integrity of the reporting itself. Gramm-Leach-Bliley Act (GLBA) – Passed in 1999, the GLBA requires all types of financial institutions to protect customers’ private financial information. Health Insurance Portability and Accountability Act (HIPAA) – Passed in 1996, the HIPAA requires health care organizations to secure patient information. Children’s Internet Protection Act (CIPA) – Passed in 2000, CIPA requires public schools and public libraries to use an Internet safety policy. The policy must address the following: * Children’s access to inappropriate matter on the internet. * Children’s security when using e-mail, chat rooms, and other electronic communications. * Restricting hacking and other unlawful activities by children online. * Disclosing and distributing personal information about children without permission. * Restricting children’s access to harmful material. Family Education Rights and Privacy Act (FERPA) – Passed in 1974, FERPA protects the private data of students and their school records. Federal Information Security Management Act (FISMA) – Passed in 2002, the FISMA requires federal civilian agencies to provide security controls over resources that support federal operations...
Words: 1342 - Pages: 6
...comprehensive infrastructure it is important that the fundamental basis in terms of cabling is of a sufficiently high quality to support current and future operational requirements. Due to the size of the building there would be limitations if using Cat 5 based Ethernet cables for example and so therefore there should be a requirement to utilize Cat 6 based Ethernet as this will support a maximum cable length in excess of 300 ft without there being any connectivity or performance issues (Mitchell, 2014). Each of the two floors will have a designated server room that is designed to provide a central point of connectivity for all locations on that floor, and each of the rooms on the first and second floor will require a certain number of data ports based on their expected utilization. This can then be used to determine the patching and switch requirements for each of the two floors respectively, including an appraisal of the peripheral items: oom | Staff Connections | Student Connections | Total Data Points | 1st Floor Location | Staff Connections | Student Connections | Total | Lecture Classroom 1 | 1 | | 1 | Lecture Classroom 2 | 1 | | 1 | Office 1 | 1 |...
Words: 1451 - Pages: 6
...accurate, versatile, and reliable through electronic equipment. Equipment ranges from simple recorders to sophisticated computer systems. Data acquisition products serve as a focal point in a system, tying together a wide variety of products, such as sensors that indicate temperature, flow, level, or pressure. Recorders and Dataloggers are products used with sensors to document information relating to a process. Recorders usually have a pen that deflects as a percentage of input span, while paper moves beneath it at a defined speed in relation to time. The recorder output is an easy-to-read, continuous trend line. Dataloggers typically print the actual value of the input with a time stamp. The advantages of the datalogger include less paper usage, higher resolution of the reading, and less chance of misinterpretation of the data. Hybrid recorders are instruments that have both trend recording and datalogging ability. Some of these units also include features such as math calculations and communication ability to transfer data to a host computer for further analysis. Computers, which have become so prevalent throughout our lives, have become a major component in data acquisition. Depending on the skill level of the user and the products, the computer can take on several different roles. Two ways to classify computer-related data acquisition products are those that “plug-in” directly into the...
Words: 1042 - Pages: 5
...Identifying Potential Malicious Attacks The CIO Company will use firewalls, intrusion detection systems, virus scanners and other protective software to provide some assurance that the security policies for the site are properly implemented. Firewalls are the basis of computer and network security defense. They are widely deployed. They are very hard to configure properly, and people who configure them may not know the current threats and attacks. For example, an administrator maybe working on some task and might leave something open in a firewall where attackers can enter through. Some firewalls have the vulnerability that enables attackers and be defeated. By identifying the network components, you can evaluate their vulnerabilities. These vulnerabilities can have flaws in the technology, configuration, or security policy. Vulnerabilities can be fixed different ways, applying software patches, reconfiguring devices, or deploying countermeasures such as firewalls and antivirus software. Threat is when people take advantage of vulnerability and cause a negative impact on the network. If threat occurs it needs to be identified, and the associated vulnerabilities need to be addressed to minimize the risk. As of today, most of the hackers are interested in hacking services such as HTTP (TCP Port 80) and HTTPS (TCP Port 443), which are open in many networks. By using access control devices, they can detect malicious exploits aimed at these services. Now these days applications...
Words: 1060 - Pages: 5