Free Essay

It 234 Unit 7

In:

Submitted By jimbob123
Words 999
Pages 4
Question 7-1 There are many ways that a network can be attacked; in turn there are many ways to safeguard your network. One way is running a vulnerability scan. The other is running a penetration test. Both are useful in their own way and used together can help keep your network safe. A vulnerability scan is a scan that is continuously runs on a network. It is looking for new vulnerabilities that may be on a network. There are many was a new vulnerability can be made in a network, a new program was installed or something has weakened security of network. This scan will give you a list of any and all new vulnerabilities that now exist in your network. A penetration test is something that should be done once a year. During this test your network gets intentionally attacked. The attacker is given permission to try to gain authorized access to system so you know where it is at its weakest and what needs to be addressed. When someone is attacking in this manner it is an ethical hack. Black box testing is when the attack has no knowledge of the internal workings of the system. This type of testing would be done in a penetration test. A gray test the attacker has some knowledge of the system they are trying to access. White box testing is when attacker has full knowledge of the system they are trying to gain access to. White box testing would be more of a vulnerability test. With both types of test being performed it will increase your chances of keeping your network safe. One type of testing would be ok but you would leave yourself open for either a long term or short term problem depending on which method is chosen. (Berkeley, 2014)

Question 7-2 WEP stands for Wired Equivalent Privacy. This is a security protocol that is specified in the IEEE Wireless Fidelity standard. It adds security to a wireless local area network that is similar to the security a wired local area network would have. It does this by encryption and being set up to require passwords to access the network. (Searchsecurity.techtarget.com, 2014) WAP stands for Wireless Application Protocol. This protocol allows wireless devices to access the internet. It does this by letting hand held devices access information that normally couldn’t be accessed due to the way web sites work as they require a click to brows the site. WAP is slowing being phased out as more mobile devices fully support HTML and other types of web design codes. (Tyson, 2014)
WPA/WPA2 is the Wi-Fi Protected Access/ Wi-Fi Protected Access 2. These are both protocols that are used for network security. The WPA uses a Temporal Key Integrity Protocol or TKIP that uses RC4 algorithm for encryption and also uses a key management and effective integrity checking. A WPA2 does all the WPA does but also supports the AES-CCMP encryption protocol. (Pcmag.com, 2014) WTLS stands for Wireless Transport Layer Security. This is the security level of the WPA. It was designed to help the issues that low bandwidth and slow processing power and provide authentication in mobile devices. WTLS allows encryption keys to be updated during secure sessions. (Searchmobilecomputing.techtarget.com, 2014)

Question 7-3 No wireless network is 100% attack proof. They all have vulnerabilities, from default settings, to user mistakes there are many ways a wireless network can be compromised. Right from opening up the wireless router it’s exposed to attack. Wireless routers are shipped in an unsecure state, so if settings are not changed you have just left your wireless network vulnerable. When you first install the router you need to check the settings. Do not allow anyone to hook up make it a private network and set up a password to connect to it. Wireless zero configuration is another way your network can be vulnerable. What this is, is when you connect to your network the information is stored so next time device is turned on or searching for service your information is sent out. It does this to reconnect to your network. While your device is looking to automatically connect an attacker can pick up those packets being sent out and then gain access to your system. To help protect against this you should set up your device to manual connection and not allow your device to send that information out automatically. Bluetooth exploits is another way your network can be vulnerable. There are different ways your Bluetooth can be used against you. One is BlueSnarfing, this is where an attacker accesses your calendar, pictures, and contacts through your Bluetooth connection. Another is BlueJacking were an attacker renames there device to something you may be connecting to so you connect with it, once you connect the attacker can send viruses and other things into your device. Keeping your Bluetooth connection off when not using it can help protect you against these attacks, also only connect to the device you know is yours. (Net-security.org, 2014)

References
Berkeley,. (2014). Retrieved 13 May 2014, from https://security.berkeley.edu/content/what-difference-between-vulnerability-scan-and-penetration-test?destination=node/195
Net-security.org,. (2014). The Ten Most Critical Wireless and Mobile Security Vulnerabilities. Retrieved 13 May 2014, from http://www.net-security.org/article.php?id=927&p=2
Pcmag.com,. (2014). WPA Definition from PC Magazine Encycl opedia. Retrieved 13 May 2014, from http://www.pcmag.com/encyclopedia/term/54879/wpa
Searchmobilecomputing.techtarget.com,. (2014). What is Wireless Transport Layer Security (WTLS)? - Definition from WhatIs.com. Retrieved 13 May 2014, from http://searchmobilecomputing.techtarget.com/definition/Wireless-Transport-Layer-Security
Searchsecurity.techtarget.com,. (2014). What is Wired Equivalent Privacy (WEP)? - Definition from WhatIs.com. Retrieved 13 May 2014, from http://searchsecurity.techtarget.com/definition/Wired-Equivalent-Privacy
Tyson, J. (2014). HowStuffWorks "How WAP Works". HowStuffWorks. Retrieved 13 May 2014, from http://computer.howstuffworks.com/wireless-internet.htm

Similar Documents

Premium Essay

Inn Room Safe Case

...days to top qualifying customers and those paying by bank wire transfer. For other, less credit worthy customers, net terms of 10and 15 days are required. Inn-Room does not allow for a discount for early accounts receivable collections. Recognizing that sales volume should increase and that bad debt expenses hould decrease, Inn-Room is considering offering a 2% discount to those hotels who pay for shipment within 10 days. Today, Inn-Room’s average collection period is 23 days. With the proposed discount offering this number is expected to reduce to 14 days. Bad debt expense is expected to decrease from 0.8% to 0.5%. Inn-Room now sells 1,700 safes on credit at an average price of $234 and a variable cost of $157 per unit. After the discount, Inn-Room forecasts that sales will increase by 7% and that 70% of all...

Words: 959 - Pages: 4

Premium Essay

Unit 4 Assignment 1

...1 Running head: UNIT 4 ASSIGNMENT 1 Fundamentals of Finance BUS 3062 Rodtrice Johnson 3/7/16 Unit 4 Assignment 1 Dennis Hart 1. Q: Proficient-level: "How do Cornett, Adair, and Nofsinger define risk in the M: Finance textbook and how is it measured?" (Cornett, Adair, & Nofsinger, 2016). Distinguished-level: Describe the risk relationship between stocks, bonds, and T-bills, using the standard deviation of returns as the measure of risk. Answer Proficient-level: Risk is defined as the volatility of an asset’s returns over time. Specifically, the standard deviation of returns is used to measure risk. This computation measures the deviation from the average return. The idea is to use standard deviation, a measure of volatility of past returns to proxy for how variable returns are expected to be in the future. Answer Distinguished-level: Stocks and bonds have very different risk-return characteristics. In general, while stocks are more volatile than bonds, over the long run, stocks are expected to yield higher returns than bonds. By varying the mix of stocks and bonds in a portfolio, an investor can achieve her desired level of risk exposure. However, the level of risk in a portfolio depends not only on the risks of individual assets, but also on the movements of the individual assets in the portfolio. 2. Q: Proficient-level: "What is the source of firm-specific risk? What is the source of market risk?" (Cornett, Adair, & Nofsinger, 2016, p...

Words: 1067 - Pages: 5

Free Essay

Practical Use of Ict Equipments

...projector: is a device that receives a signal and projects the corresponding image on a projection screen using a lens system. It takes a signal from a Computer, TV or Video source to produce a larger image using a projector light and displays it on a screen. Digital Projector  Visualisers: Otherwise called document cameras, are real-time image capture devices for displaying an object to a large audience. Like an opaque projector, a document camera is able to magnify and project the images of actual, three-dimensional objects, as well as transparencies 1 Website: www.axiomlearn.com Email: info@axiomlearn.com Tel: (234) 702 821 1323 Visualiser  Wireless Keyboard: Computer Keyboards for entering letters, numbers or symbols without the wired extension connected to the Computer/Screen. A wireless keyboard often includes a required combination transmitter and receiver unit that attaches to the computer's keyboard port. The wireless...

Words: 3647 - Pages: 15

Premium Essay

Football

...Zachary Wilson Writing 121-037 Z Hitzel Unit #1 Essay February 3, 2014 Liberal Arts: Is it Necessary? Liberal arts education has proven to be a very controversial topic to those concerned or affected by it, and it is questioned how or if it should be implemented into college curriculum. Liberal arts education is defined as “the academic course of instruction at a college intended to provide general knowledge and comprising the arts, humanities, natural sciences, and social sciences, as opposed to professional or technical subjects” (“liberal arts”). Generally, American colleges allow students to choose a major and take prerequisites, however students usually aren’t able to get into the meat of their major studies until their junior year, leaving the first two years of college to liberal arts classes. So, how should it be put into practice? In Patrick N. Allitt’s essay, “Should undergraduates specialize?” and in Mark Jackson’s “The Liberal Arts: A Practical View,” both authors explain how they think such education should be implemented. Although Allitt argues that students should be able to choose whether or not they want a liberal arts education, and Jackson argues that it should be required in order to create versatile students, I believe their ideas should be combined, and that a liberal arts education should be encouraged but not required of students, because I think it is ultimately up to the students themselves what classes they want to take as well as whether...

Words: 1526 - Pages: 7

Free Essay

Marketing 279 Term Paper

...Over-Booked Marketing 379 – Market Research Methods Executive Summary This service offered by us will allow current college students to have access to required textbooks through an electronic book service. This type of service will be different from our competitors as it will be available through kiosks placed on campus and students will have choices between renting only a portion or an entire book. Rent duration will be anywhere from just one day to an entire semester – all for a student to decide. Another characteristic that differentiates us from competitors is our ability to offer electronic books at a low price. Our product is user-friendly and developed specifically for college students who need quick and easy access to desirable textbooks and parts of textbooks without paying a large amount of money for them. In order to move forward with our product, we first needed to estimate our potential customer demand. A survey was conducted on various college and university campuses and covered over 200 students. Questions required both qualitative and quantitative responses that allowed us to answer our research objectives. * What industry are we in? * What are the current industry trends for e textbooks? Growth or decline? Products offered? Consumer targets? Advertising and promotions? * Who are the competitors and what is their target and marketing mix? * What is the consumer behavior of students with regard to buying textbooks and e-textbooks? How...

Words: 18818 - Pages: 76

Premium Essay

Memo

...833800.95 | PC Mouse | 5996.5 | Grand Total | 997552.6 | 3. Sales by store Row Labels | Sum of Total Sales | 1 | 90281.1 | 2 | 54262.7 | 3 | 90051.25 | 4 | 75498.75 | 5 | 158334 | 6 | 267648.9 | 7 | 170040.85 | 8 | 91435.05 | Grand Total | 997552.6 | | | 4. Sales by week Row Labels | Sum of Total Sales | 27-Oct-08 | 317722.75 | 24-Nov-08 | 341961.05 | 29-Dec-08 | 337868.8 | Grand Total | 997552.6 | 5. For which products we need more marketing? Row Labels | Sum of Units Sold | 101 Keyboard | 917 | 17" Monitor | 609 | Desktop CPU | 981 | PC Mouse | 670 | As 17’’ monitor has the least sales thus it needs more marketing. 6. On regional basis, which products need more advertising? Row Labels | Sum of Units Sold | East | 1532 | 101 Keyboard | 385 | 17" Monitor | 328 | Desktop CPU | 522 | PC Mouse | 297 | North | 882 | 101 Keyboard | 309 | 17" Monitor | 117 | Desktop CPU | 234 | PC Mouse | 222 | South | 763 | 101 Keyboard | 223 | 17" Monitor | 164 | Desktop CPU | 225 | PC Mouse | 151 | Grand Total | 3177 | In East region: PC mouse needs more advertisement. In North Region: 17" Monitor needs more advertisement. In South Region: PC mouse needs more advertisement. 7. Top 5 branch manager will get 5% commission on sales. In which region these branches are located? Row Labels | Sum of Total Sales | 1 | 90281.1 | South | 90281.1 | 2 | 54262.7 | South | 54262.7 | 3...

Words: 408 - Pages: 2

Premium Essay

Operation Management

...[pic] MGMT 405 Operations and Production Management Answer set 2 (Reference chapter 2 – William J. Stevenson-2007, ninth edition) Problems and Solutions 1. Suppose that a company produced 300 standard bookcases last week using eight workers and produced 240 standard bookcases this week using six workers. In which was productivity higher? Explain. Ans: Productivitylast week = standard bookcases produced as output / labor= 300/8= 37.8 sbc/worker Productivity this week = standard bookcases produced as output / labor= 240/6= 40 sbc/worker The ouput of this week shows that it has higher productivity than last week. This answer can be improved. 2. The manager of a crew that installs carpeting has tracked the crew’s output over the past several weeks, obtaining these figures. |Week |Crew size |Yards Installed | |1 |4 |960 | |2 |3 |702 | |3 |4 |968 | |4 |2 |500 | |5 ...

Words: 541 - Pages: 3

Premium Essay

Acc505

... Direct labor 48,300 Manufacturing overhead 34,600 Selling expenses 29,800 Administrative expenses 36,700 Interest expense 8,500 During the month, 6,400 units of product were manufactured and 5,900 units of product were sold at $ 35 each. On January 1, East of the Border carried no inventories. a. Cost of goods manufactured: Current period manufacturing costs - Raw materials $ 45,100 Direct labor 48,300 Manufacturing overhead 34,600 Total $128,000 Cost per unit = $128,000 / 6,400 = $20 b. Cost of goods sold = $20 * 5,900 = $118,000 c. The difference between cost of goods manufactured and cost of goods sold is in the finished goods inventory account on the balance sheet. In this case, since more units were produced (6,400) than sold (5,900), the finished goods account will increase by $10,000 ($20 per unit * 500 units). Ch 5 High Low Method – TCO E | |Week 1 Chapter 5 Exercise 6 Data | | | | | | | | | | | | | | |1.) | | |Units Shipped | |Costs | | | | |High Activity Level | |8 | | ...

Words: 1942 - Pages: 8

Premium Essay

Accounting

... | | | | |101 | | | |Supplies | |P |2.20 | |P |72,600 | |Budgeted sales (units) | | |60,000 | | |40,000 | |Add: Finished goods inventory - 01/01 | | |20,000 | | |8,000 | |Total goods available for use | | |80,000 | | |48,000 | |Less: Afinished good inventory - 12/31 | |25,000 | | |9,000 | |Budgeted production (units) | | |55,000 | | |39,000 | c. Ilocos Corporation Budgeted Raw Materials Purchases For the Year Ended, December 31,20B | | |Material | | | | |A | | |B | |Budgeted production (units) | | |55,000 | | |39,000 | |x No. of hours per unit | |  |2 | |  |3 | |Direct labor hours | | |110,000 |...

Words: 2248 - Pages: 9

Free Essay

Nt 1210

...NT-1210 Unit Name Lab l Labs Date 1-l Reading Binary Convert the following decimal numbers to binary equivalents: 89 1011001 776 10110000 Convert the following Binary values to their decimal equivalent: 101_0100L 169 11101010 234 Lab 1-2 Binary Math and Logic Draw the graphical symbol Explain the logical operations (give a truth table) for each: AND OR NOT Lab 1.3 Bit and Byte Structure - (see page 15 of lab manual) How many bits are in a byte? 8 1 Kilobyte is equal to: 1024 55,296 23,552 bytes Kilobytes Megabytes Terabytes 54 Megabyte is equalto: 23 Gigabyte is equalto: 5 Terabyte is equal to 5,120 120MB = 16GB= 125,829,120 16,384 bytes MBytes Lab 1.4 ASCII (See page 20 of Lab manual) 1. Decode the simple numerical sentences into one English paragraph. You may use Google to find an ASCII table. Use the keywords-Binary to text conversion; Hexadecimatto text conversion; ASGllto text conversion-to aid the decoding process: Code"Tvoe ASC llcodes Numeric Message 87 101 1 08 1 08 44 32 116 104 97 116 32 109 97 107 101 115 32 111 117 114 32 49 48 32 110 117 109 98 101 114 32 100 101 99 105 109 97'108 3247 3297 115 99 105 10532115121115116 101 '10932 106 117 11511632114105103104 11633148 Translation Well, that makes our 10 number decimal / ASCII system just right! Lab 1.5 Creating a File System Follow the procedures outlined in the Lab Manual on pages 231o27 Exercise...

Words: 918 - Pages: 4

Free Essay

Network

...Network Technology and Service Integration Unit 1 Homework The following homework is designed to cover the course objectives for this unit. Assignment 1.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises...

Words: 2825 - Pages: 12

Premium Essay

Bullshit

...1. Introduction In the developed countries Enron Xerox, WorldCom etc. had been caught of getting involved in accounting scandals since 2001, which leads to the credibility of corporate financial reports under suspicion, furthermore, shocking investors’ confidence. Consequently, corporate governance mechanism has been a crucial issue discussed again. Sarbanes-Oxley Act was enacted in 2002 to enhance corporate government mechanism which is viewed as the priority of financial revolution, in the expectation that governance mechanism may be reinforced, public confidence retrieved, accuracy and reliability of financial information assured. In Bangladesh a massive stock market meltdown hit the market in the middle of 2010. The DGEN Index was cut by two third and a lot of investor lost all of their money. Then very recently major financial institutions like Sonali Bank, Basic Bank etc. were caught in financial scam which again shook the confidence of the market to such industries. These events renewed and reinforced people’s interest in study of corporate governance and how it could have prevented such mishaps. Corporate governance describes the structure of rights and responsibilities among the parties that have a stake in a firm. System of corporate governance could be defined as a set of processes and structures used to direct a corporation's business. Once implemented, an effective corporate governance system can help to ensure an appropriate division of power among shareholders...

Words: 9456 - Pages: 38

Premium Essay

Effects of Intrinsic Stress

...avoids high dissolved oxygen stress by activation of SoxRS and manganese-superoxide dismutase. Microbial Cell Factories 12:23. Farr SB, Kogoma T, (1991) Oxidative stress responses in Escherichia coli and Salmonella typhimurium. Microbiological Reviews 55(4):561-585 Munna MS, Nur IT, Rahman T, Noor R (2013) Influence of exogenous oxidative stress on Escherichia coli cell growth, viability and morphology. Am J BioScience 1(4): 59-60 Munna MS, Tamanna S, Afrin MS, Sharif GA, Mazumder C, et al. (2014) Influence of aeration speed on bacterial colony forming unit (CFU) formation capacity. Am J Microbiol Res. 2(1): 47-51. Murata M, Noor M, Nagamitsu H, Tanaka S,Yamada M (2012) Novel pathway directed by rE to cause cell lysis in Escherichia coli. Genes Cells. 17:234-237. Noor R, Islam Z, Munshi SK, Rahman F (2013) Influence of temperature on Escherichia coli growth in different culture media. J Pure Appl Microbiol 7(2):899-904. Noor R, Murata M, Yamada M (2009) Oxidative stress as a trigger for growth phase-specific óE dependent cell lysis in Escherichia coli. J Mol Microbiol Biotechnol 17(4):177-87. Nur IT, Munna MS, Noor R (2014) Study of exogenous oxidative stress response in Escherichia coli, Pseudomonas spp., Bacillus spp. and Salmonella spp.. Turk J Biol 38:502-509. Rees CE, Dodd CE, Gibson PT, Booth IR, Stewart GS (1995) The significance of bacteria in stationary phase to food microbiology. Int J Food Microbiol 28(2):263-75. Schimel J, Balser TC, Wallenstein...

Words: 274 - Pages: 2

Premium Essay

Mega Trends

...VisionMobile Mobile Megatrends 2011 how telecoms business is transforming in the software era. updated 8 March 2011 Copyright VisionMobile 2011 Knowledge. Passion. Innovation. Andreas Constantinou Michael Vakulenko Matos Kapetanakis (c) VisionMobile 2011 Licensed under Creative Commons Attribution 3.0 Unported License (http://www.creativecommons.org/licenses/by/3.0) You are free to Share or Remix any part of this work as long as you attribute this work to VisionMobile (www.visionmobile.com). Copyright VisionMobile 2011 VisionMobile research Distilling market noise into market sense Research competitive analysis, commissioned research, company due diligence Developer Economics 2010: Everything on mobile development Training open source economics, Android commercials, mobile industry dynamics Market maps Competitive landscape maps of the mobile industry Strategy definition strategy design, ecosystem positioning, product definition Active Idle Screen Who will own the screen? Open Source Chessboard business impacts of mobile open source, the competitive landscape and how to design your company strategy Mobile Industry Atlas, 3rd ed. 1,100+ companies, 69 market sectors Mobile Megatrends series Top-100 analyst blog GPLv2 vs GPLv3 White Paper The Android Game Plan the commercial mechanics behind Android and how Google runs the show 4,000+ subscribers 20,000+ monthly uniques 90% mobile industry insiders 100 million club tracking...

Words: 1526 - Pages: 7

Free Essay

Equity Theory

...Equity theory proposes that individuals who perceive themselves as either under rewarded or over rewarded will experience distress, and that this distress leads to efforts to restore equity. (Huseman, 1987). John Stacey Adams, a workplace and behavioral psychologist, asserted that employees seek to maintain equity between the inputs that they bring to a job and the outcomes that they receive from it against the perceived inputs and outcomes of others. (Adams, 1965) When people feel fairly or advantageously treated compared to their peers, they are more likely to be motivated; when they feel unfairly treated they are highly prone to feelings of disaffection and de-motivation. The way that people measure this sense of fairness is at the heart of Equity Theory. (Champman, 1995-2010) In my organization, many feel like they are underpaid when compared to co-workers who have similar job functions. Many also have the impression that co-workers in our Foster City office only 20 miles away are paid much more (output) for the same positions (inputs). When speaking with these employees I gather a sense of hostility and regressed performance based on the perceived feeling of unfairness. A proposed solution is to link each job title to a specific salary code which will have a specific associated salary pay range within each geographical region. I think this will work because it takes away from often false assumptions that certain individuals make more than others which cause employees to...

Words: 520 - Pages: 3