Premium Essay

Nt1310 Unit 7 Exercise 1

Submitted By
Words 539
Pages 3
1. Avoiding the risk of infiltration, we must ensure that the system does not kemasukaan intruder who can read, write and execute programs that could disrupt or destroy our system.
2. Reduce the risk of threats, it is customary for institutions and private companies. There are several types of intruders that can attack the system that we have, among others:
a. Si Want to Know, type of intruder is basically interested in finding the type of system that we use.
b. Destroyer, this type of intruder wants to damage the system that we use or change the screen display that we make.
c. Infiltrate to the popularity, the intruder is using our system to achieve the popularity of her own, the higher the security system that we make, the more make him curious. If he managed to get us to a system that is a means for him to promote himself.
d. The competitor, the intruder is …show more content…
Protecting the system from vulnerabilities, keretanan will make our system has the potential to provide unauthorized access to other people who are not eligible.
4. Protecting the system from natural disturbances such as lightning and others.
In line with the increasingly complex and increasingly rapid advancement of information technology, it will be increasing the risk concerning data security today. For those of us who are accustomed to using Microsoft products, both the Microsoft Windows and Microsoft Office would be very understanding about this. Every day we face the risk of the virus, either through email or from friends who use Microsoft format.
See from the points above, actually why we need to maintain computer security is to keep the information, because the information has become a very important commodity. Some even say that we've been disebuah "Information based society". The ability to access and provide information quickly and accurately becomes very essential for an organization, either in the form of commercial organizations (companies), universities, government agencies, and

Similar Documents

Premium Essay

Nt1310 Unit 7 Exercise 1

...1. Data rate is the amount of data that transmitted through a connection. Data rate takes several forms, among them are: bit per second, kilobit per second, megabit per second, and gigabit per second. Data rate is possible to use based on performance characteristic. The way to address data rate is via software based configuration or hardware based. Data rate is no possible to be higher than bandwidth. Error rate is relevant that consist of data link such as fibre optic, Ethernet, and system which sending data via network form that is possible to raise degradation of digital signal. An error into a system is possible to happen when data is communicating over data link. Rate that issues is shown in transmission is called as error rate. Data rate address in Bps is known as bandwidth. One of common thing is twisted pair cable, it have different series of cable, and they are Cat3, Cat4, Cat5, Cat5e, Cat6, and Cat6e. Those series have a similarity but they are having a different limitation of speed, like Cat5 is owning 10Mbps and 100Mbps speed capacity, Cat6 is possible to send data up to 10Gbps....

Words: 515 - Pages: 3

Premium Essay

Nt1310 Unit 7 Exercise 1

...investigation and observing. In case of active attacks, the attacker tries to change or extinguish the data being exchanged in the network. This attack disturbs the normal functioning of the network. Active attacks can be inner or outer. External attacks are performed by nodes that do not fit in to the network. Internal attacks are from sick nodes that are part of the network. Since the invader is already part of the network, internal attacks are more stern and difficult to detect than external attacks .The final goals of the security solutions for MANETs is to supply security services, such as authentication, confidentiality, integrity, authentication, non-repudiation, and availability to mobile users. The different potential attacks are:- 1. Black hole attack:- According to this attack, an attacker makes use of the routing protocol to promote itself as having the shortest route to the node whose packets it wants to capture. When the attacker obtains a request for a route to the destination node, it generates a reply message which publicizes itself as a suitable path to destination. The attacker captures the seized packets without any forwarding. Gray hole Attack:- The gray hole attack is also named as mischievous attack. In this attack, the attacker discerningly drops the packet with fixed probability. Also, in this attack the impostor node behaves malevolently for the time it discerningly drops the packets and then switches to its regular behavior. Wormhole attack:- In this...

Words: 1800 - Pages: 8

Premium Essay

Nt1310 Unit 7 Exercise 1

...of the node should default be kept private and not be distributed by the node itself or the system software. This criterion is closely related to privacy preserving, in which we should try to protect the privacy of the nodes from arbitrary disclosure to any other entities. Confidentiality: Confidentiality ensures that information is accessible only to those authorized to have access and it is one of the cornerstones of information security. In other words, in order to maintain the confidentiality of some confidential information, we need to keep them secret from all entities that do not have the privilege to access them. 1.8 ORGANIZATION OF THESIS The organization of thesis contains the following chapter: Chapter 1: The Introduction discussed overall thesis Chapter 2: Survey the various existing method and drawback are reviewed About Mobile Ad hoc Network, cryptography techniques and Modified Encryption. Chapter 3: The methodologies are described existing and proposed system. The proposed system was explained about MODIFIED RC4 algorithm approach Chapter 4: The performance evaluation and result discussed Proposed Compared with existing system. Chapter 5: The Conclusion was concluded about the thesis. Chapter 6: The last chapter has discussed about future. ...

Words: 773 - Pages: 4

Premium Essay

Nt1310 Unit 7 Exercise 1

...communicate with a “Hello” message in AODV. When E doesn’t respond to node D’s message, D will record it as a link break • Link failure information is sent to active neighbors only and E is not active, because it is not involved in transferring data. So D will not propagate this link break to other nodes. f. The link between A and B is broken, as A moves away from B. B detects it as it can’t receive “Hello” message from A now. Now since the node A has moved from it’s place it will update it’s routing table Destination ID Via Distance Sequence # D B ∞ 23 It will also increment D’s sequence number. Now node A will send the RREQ again to find a new route to destination cause A moved to a new place. Hence A will increment its own sequence number by 1. Now A has sequence number as 14. RREQ of A: Destination ID Destination Sequence# Source ID Source Sequence# Hop Count D 23 A 14...

Words: 547 - Pages: 3

Premium Essay

Nt1310 Unit 7 Exercise 1

...For purpose of network paralysis, DDoS attack occupies a lot of cyber source by sending massive number of legitimate requests. This attack mode can be divided into the following 4 categories: Disturb or block the normal network communication by making the network overload; Through a large number of requests submitted to the server, the server overload; Blocking users get access to the server; Blocking a service communicate with a particular system or person. IP spoofing is the approach that hackers send false packet to the server for deception server. Specifically, it set the source IP address in the packet to inexistence or legitimate value. The server once receiving the packet will try to return to accept the request packet. In fact this package never returns to the source computer. This approach makes the server must open their listening port continue to wait. It wasted all aspects of system resources. This mode of attack is similar to SYN floods. However, in the LAND attack attacks, the original address and the destination address in the packet are both IP address of attacked targets. This attack will cause the attacked machine falls into an infinite loop, and eventually it will run out of resources and crash. The ICMP floods sends broadcast message to the router with improper settings to keep system resources occupied. Application level floods mainly aimed at the application layer. Its purpose is consuming a large number of system resources for the purpose to persecute the...

Words: 1181 - Pages: 5

Premium Essay

Nt1310 Unit 7 Exercise 1

...1. Energy: The sensor nodes are generally inaccessible after deployment and normally they have a finite source of energy that must be optimally used for processing and communication to extend their lifetime. It is a well known fact that communication requires significant energy. In order to make optimal use of energy, therefore communication should be minimized as much as possible. 2. Redundancy: Due to the frequent node failures and inaccessibility of failed nodes, WSNs are required to have high redundancy of nodes so that the failure of few nodes can be negligible. 3. System Lifetime: The WSNs should function as long as possible. Their system lifetime can be measured by using generic parameters such as time until the nodes die or by using...

Words: 1568 - Pages: 7

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2

Premium Essay

Nt1230 Syllabus

...routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Premium Essay

Nothing

...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...

Words: 10839 - Pages: 44

Premium Essay

Unit 3 Exercise 1 Nt1310

...| Unit 3. Exercise 1. | | Specifications - Definitions | | Unit 3. Exercise 1. | | Specifications - Definitions | NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi 1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer) 2. Unshielded twisted-pair: UTP cable is a popular cable used in computer networking that consists of two shielded wires twisted around each other. In the image to the right, is an example of the different network cables you're likely to encounter. (/jargon/u/utpcable.htm) 3. Shielded Twisted-pair: Twisted Pair (STP) has a fine wire mesh surrounding the wires to protect the transmission; Unshielded Twisted Pair (UTP) does not. Shielded cable is used in older telephone networks, network, and data communications to reduce outside interference. In the picture to the right, is an example of what these cables look like inside. (jargon/t/twispair.htm) 4. Fiber-Optic cable: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. These...

Words: 1317 - Pages: 6

Free Essay

Connector Installations

...NT1310 Unit 6 Exercise 1 Luz Garcia 7/22/14 Connector Installations Twisted-pair cable: Step 1: Measure the cable you want to put ends on and trim it to the proper length using the cable cutter. Step 2: Use the cable stripper to strip about 1.5" of the jacket from the end of the cable. Then, rotate the stripper around the cable twice. This will cut through the jacket. Step 3: Remove the stripper from the cable and pull the trimmed jacket from the cable, exposing the inner conductors. If a jacket slitting cord (usually a white thread) is present, separate it from the conductors and trim it back to the edge of the jacket. Step 4: Untwist all the inner conductor pairs and spread them apart so that you can see each individual conductor. Step 5: Line up the individual conductors so that the color code matches the color-coding standard you are using. Step 6: This step includes two points. First, trim the conductors so that the ends are even with each other, making sure that the jacket of the cable will be inside the connector. Second, the total length of exposed connectors after trimming should be no longer than 0.5" to 0.625". Step 7: Insert the conductors in the connector, ensuring that all conductors line up properly with the pins as they were in the previous step. If they don't line up, pull them out and line up. Do this carefully, as it's the last...

Words: 591 - Pages: 3

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28

Premium Essay

Nt2640

...degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Free Essay

Nt1310 Unit 9 Exercise 1

...Montie Ramsarran August 11th, 2014 NT1310 Mr. Amos Unit 9 Exercise 1 Light Source and Components-Definitions 1. Forward Biased LED: A bias voltage that is applied to a pn-junction in the direction that causes a large current flow; used in some semiconductor diode circuits. 2. Incoherent Light: Light in which the electric and magnetic fields of photons are completely random in orientation. Incoherent light is typically emitted from light bulbs and LEDs. 3. Laser: Acronym for light amplification by stimulated emission of radiation. The laser produces a coherent source of light with a narrow beam and a narrow spectral bandwidth (about 2cm). Lasers in fiber optics are usually solid-state semiconductor types. Lasers are used to provide the high-powered, tightly controlled light wave lengths necessary for high-speed, long-distance optical fiber transmissions. 4. Output Pattern: A setting that selects the output pattern for comparison outputs. This enables outputs for changes in levels rather than just upper/lower limit comparisons to set value. It can be set according to the control applications. Note: The settings must be as follows for correct zone outputs. 5. Output Power: The useful signal or power delivered by a circuit or device. 6. Modulation Speed: (1) Coding of information onto the carrier frequency. Types of modulation include amplitude modulation (AM), frequency modulation (FM), and phase modulation...

Words: 1207 - Pages: 5

Premium Essay

Fsmo Role Ayer Nate Method

...have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers, personally...

Words: 10360 - Pages: 42