Preview

IS3230 Lab 4

Good Essays
Open Document
Open Document
528 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3230 Lab 4
Lab 4 Worksheet
1. By opening ports in your firewall it is allowing people access to your network and if anybody tries to get in figures out the port, they can potentially gain access to your system.
2. By going to start>control panel>firewall. Here it gives you the options that are on Windows Firewall.
3. E-commerce involves the passing of sensitive information like credit card numbers or bank account numbers over the internet, and the risk of losing the privacy of this information is high in public places. –Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. –Evil twin hotspots: these are hotspots setup by a hacker and made available to the public. Unknowing users who connect to the intent using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSl encrypted and look for a valid security certificate.
4. NIC, Acces Point, Wireless NIC
5. Video, conferencing, email, messaging, phone calls and Bluetooth.
6. WLAN such as wireless A, B, or G is commonly used for networking computers wirelessly and Bluetooth is a trademarked communications protocol initially designed for wireless keyboards and mice but now most commonly used for wireless cell phone headsets.
7. Having both NIC’s enabled on laptop or workstation that is hooked up to your network is if a hacker can gain access to your wireless NIC and your computer is also hardwired into your network that hacker can then easily gain access to your network via your workstation.
8. WEP's major weakness is its use of static encryption keys. When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. But the fact that packets are encrypted doesn't

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab8 is3440

    • 129 Words
    • 1 Page

    1 Bascially RPM command is used for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Linux system.…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Wireless networks are less secure than wired networks, both in terms of access and in terms of user information. Because the information to and from the computer is broadcast instead of traveling over a wire, it is much easier to intercept.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Assignment 1

    • 2755 Words
    • 12 Pages

    My firewall may be effective at blocking some attacks and offering a certain amount of protection. But a firewall does not guarantee that your computer will be attacked. In particular, a firewall offers little to no protection against viruses. However using a firewall in conjunction with other protective software and safe practices will strengthen resistance to attacks. Anti-virus software details vary between packages but basically it scans files on your computer’s memory for certain patterns that may indicate an infection, looking for signatures, or definitions, of known viruses. Authors for viruses are continually being updated and released, so it’s important you have the latest definitions installed so the software can tackle any threat new or old. Each virus software has its own method of response once it locates a virus, and the action may vary according to when it finds the virus either during an automatic or a manual scan. Most software produces a dialog box alerting you if it has found a virus and asks whether you want it to clean the file or remove it. Some software may attempt to remove the virus without first asking. A good user should familiarize themselves with the features so they know how to handle such a…

    • 2755 Words
    • 12 Pages
    Good Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    Unit 7 P6 Windows Xp

    • 1045 Words
    • 5 Pages

    Windows Firewall/Internet Connection Sharing: If you do not use these features, you can disable them.…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Checkpoint: Tjx Companies

    • 326 Words
    • 2 Pages

    An alternative to the out of date WEP could have easily been used. The Wi-Fi Protected Access (WPA) standard in conjunction with a sophisticated encryption system could have been used to replace the WEP. Firewalls could have reduced or eliminated the ability of the hackers to gain access to sensitive information. Lastly the company should have ensured that all computers containing customer information were secure when connecting to a wireless network.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    The deny-by-default rulesets for incoming traffic should be placed on host-based firewalls when accessing the network remotely to prevent malware incidents (Wikia, n.d.).…

    • 505 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    Yes, although such tools like these would automatically find security flaws with high degree of confidence that what it found was a flaw.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Session Layer Wireless Session Protocol (WSP). Unlike HTTP, WSP has been designed by the WAP Forum to provide fast connection suspension and reconnection. Transaction Layer Wireless Transaction Protocol (WTP). The WTP runs on top of a datagram service such as User Datagram Protocol (UDP) and is part of the standard suite of TCP/IP protocols used to provide a simplified protocol suitable for low bandwidth wireless stations. Security Layer Wireless Transport Layer Security (WTLS). WTLS incorporates security features that are based upon the established Transport Layer Security (TLS) protocol standard. It includes data integrity checks, privacy, service denial, and authentication services. (http://www.tutorialspoint.com/wap/wap_wml_script.htm)…

    • 1100 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Computer networks for the home and small business can be built using either wired or wireless technology. Wired Ethernet has been the traditional choice in homes, but Wi-Fi wireless technologies are gaining ground fast. Both wired and wireless can claim advantages over the other; both represent viable options for home and other local area networks (LANs).…

    • 1502 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    "Firewalls use one or more of three methods to control traffic flowing in and out of the network:…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Wired and Wireless, What’s the Difference? The main difference between a wired and wireless data communication infrastructure is the existence of physical cabling. The same or similar techniques are employed for both types of data communication infrastructure in terms of the core elements of essential network services. The basic difference between a wired and a wireless network is self-explanatory. A wired network uses wires to communicate whereas a wireless network uses radio waves. Another difference and how one technology gets an edge over the other. Wired networks are easy to set up and troubleshoot where wireless networks are comparatively difficult to set up, maintain, and troubleshoot. Wired networks make you immobile while wireless ones provide you with convenience of movement. A third difference, wired networks prove expensive when covering a large area because of the wiring and cabling while wireless networks do not involve this cost. Wired networks have better transmission speeds than wireless ones. In a wired network, user does not have to share space with other users and thus gets dedicated speeds while in wireless networks, the same connection may be shared by multiple users. One of the most common questions we have to answer on a daily basis is the difference between wired and wireless networks. Wired is the communication between two devices via cables. Wireless is the communication between two devices without cables.…

    • 1022 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Puppet Server Build

    • 8589 Words
    • 32 Pages

    It’s possible to have the firewall running — you just need to ensure that the proper ports are opened. For simplicity, and since this server is in a private network, I chose to have the firewall turned off.…

    • 8589 Words
    • 32 Pages
    Good Essays
  • Powerful Essays

    The main difference between a wired and wireless data communication infrastructure is the existence of physical cabling. The same, or similar techniques are employed for both types of data communication infrastructure in terms of the core elements of essential network services. The basic difference between a wired and a wireless network is self-explanatory. A wired network uses wires to communicate whereas a wireless network uses radiowaves. Let us look at what are the other differences and how one technology gets an edge over the other. Wired networks are easy to set up and troubleshoot where wireless networks are comparatively difficult to set up, maintain, and troubleshoot. Wired networks make you immobile while wireless ones provide you with convenience of movement. Wired networks prove expensive when covering a large area because of the wiring and cabling while wireless networks do not involve this cost. Wired networks have better transmission speeds than wireless ones. In a wired network, a user does not have to share space with other user sand thus gets dedicated speeds while in wireless networks, the same connection may be shared by multiple users. One of the most common questions we as consultants have to answer on a daily basis is the difference between wired and wireless networks. Wired: The communication between two devices via cables. Wireless: the communication between two devices without cables. Now, is it that simple Not exactly, each method of networking has its own…

    • 1858 Words
    • 8 Pages
    Powerful Essays