Preview

Nt1330 Unit 1 Case Analysis

Satisfactory Essays
Open Document
Open Document
259 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 1 Case Analysis
IS3110: Unit 1 Role Scenario
1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data
G. Remote: user virus, remote from office unsecure, VPN tunnel hack

2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Case Study

    • 294 Words
    • 2 Pages

    A) Thingamajigs and Things has total assets of $45,000 and $9,000 in liabilities. This gives a current ratio of 5.00:1. Wannabees has total assets of $150,000 and $85,000 in liabilities. This gives a current ratio of 1.76:1. Thingamajigs and Things is more likely to be approved for a loan, because it has a higher current ration. This means that their assets are higher than their liabilities (what they owe), and they are more likely to be able to make payments.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Check the linearity of the Black Box by connecting the DC Power Supply to the input of the Black Box, and the Multimeter to the output of the Black Box, then change the input voltage regularly and notice the changing in the output voltage of the Black Box.…

    • 237 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 2 Review Paper

    • 1508 Words
    • 7 Pages

    9- Which of the following stress or strength parameters is used in the computation of the force in an extrusion operation (one best answer): (a) average flow stress, (b) compression strength, (c) final flow stress, (d) tensile strength, (e) yield strength?…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Ones we have known about nodes in the network and links between them, then to analyze this network some SNA Measures are used. These measures are mathematical aggregation functions which calculates various aspects related to each node and also some of them can calculate some of the aspects with respect to the whole network .…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 4 Case Study

    • 359 Words
    • 2 Pages

    Let’s take an average page fault service time of 25 ms and a memory access time of 100 ns, then the effective access time in ns is effective access time = (1-p)*(100) +p(25 ms)…

    • 359 Words
    • 2 Pages
    Good Essays
  • Good Essays

    64. Yes p, because the elements are the same and they have the same number of…

    • 373 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The project contains two parts, photogrammetric survey, and GIS analysis. The photogrammetric survey part was done by Agisoft photoscan software. This kind of survey is desired in many fields, such as Archeology field. This is because of the tendency of collapsing in Archeology’s targets. On the other hand, ArcMap and ArcScene are responsible for the data analysis part. With GIS, the complexity of the 3D data can be simplified, the data can be interpreted, and new data can be generated. Plus, we can comfortably work on improving our model by digitizing, coloring, outlining, and updating data even after we finish the project.…

    • 909 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It is normal to have some problems after purchasing a new graphics driver, along with installing other drivers. There are many ways to “fix” this. Because it is not common for new drivers to cause more problems than they solve, and most users prefer to go back to their older version. It may not be his best option but at least this persons computer will function. A lot of these drivers need updating every now and then. You have to open the device manager and erase the driver all together. An easy way to check your stuff is to see if its plugged. Restart the system and let windows 7 detect and install the driver over again. It will cause windows to send more resources to the device and could solve your problem. As for…

    • 215 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Case 3

    • 499 Words
    • 2 Pages

    DotNetNuke uses a three-tier architecture model with a core framework providing support to the extensible modular structure. When deployed, which can be extended using pluggable modules and providers that enable additional functionality; the look and feel of individual sites can be customized using skins. As opposed to traditional web applications that may rely on a multitude of web pages to deliver content, DotNetNuke uses a single main page called Default.aspx. The content for this page is generated dynamically by using a tabID value to retrieve the skin and modules needed to build the page requested, from the DotNetNuke database. It is Used by end-users to create dynamic and interactive websites and by developers to create application functionality.…

    • 499 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This year you were able to average 95.05% on CSAT. The department goal is 96%. Based on your score, you partially met the department goal in CSAT. Your rework for the year was 6.48 %. Based on the department goal and the department average, you are exceeding expectations in rework. Your Net Promoter Score is 66.22 % for the year. This percentage is within the department range. This year you averaged 8.85 points per hour. the department goal for the year is 10 points per hour. Based on the department goal and the department average You landed right within the meeting expectations. your whole house in range averaged 95.78%. This percentage landed right within the department goal and the department range. Your whole house completed was 92.57 percent.…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It is an exception code which is suggestive of Windows registry corruption. 0x80070002 errors can start happening if the Windows registry has corrupted entries. Windows OS and Windows programs will fail to work unless you find a 0x80070002 fix.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    3. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Describe the security issues that may threaten system performanceThe possible threats to system performance may be: unwanted e-mail (‘spam’), malicious programs (including viruses, trojans) and hackers. Security precautions can be taken beforehand such as use of access controls. We can configure anti-virus software, adjust firewall settings, adjust internet security settings; backup; store personal data and software safely; treat messages, files, software and attachments from unknown sources with caution; download security software updates.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays