i have a assement of wireless mobile security

ResearchAssignmentDueWeek Eight (100 Points)

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Research Assignment Due Week Eight (100 Points)

Please complete a minimum of One writing assignment for week 8 from the following:

Please note that grading criteria are included within the Word Document. Please carefully read the directions. When completed, save your Word Document, and upload it to the assignment folder.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Required Resources
  • Internet access
Submission Requirements
  • Format: Microsoft Word (or compatible) (or compatible)
  • Font: Arial, size 12, double-space
  • Citation Style: Follow your school’s preferred style guide.
  • Length: 2-3 Pages
Self-Assessment Checklist
  • I fully addressed the question(s) in the Assignment instructions.
  • I included justification or rationale for my choices, where applicable.
  • I followed the submission guidelines.

Security Features of Wireless Technologies

Learning Objectives and Outcomes
  • Identify security features of current wireless technologies.
Assignment Requirements

You are researching the following wireless security features for your company network:

  • WEP and WPA2
  • MAC address filtering
  • SSID broadcast

Answer the following question(s):

  1. Which combination of wireless security technologies are most appropriate in the enterprise, and why?
  2. Which combination of wireless security technologies are most appropriate for public access, and why?

Fully address the question(s) in this Assignment; provide valid rationale for your choices, where applicable; -.

Secure Web Applications

Learning Objectives and Outcomes

  • Analyze secure web application design principles against specific attacks.

Assignment Requirements

You are attempting to strengthen the security of your company’s e-commerce web application. You send a memo to the staff developers requiring the next version to use proper design principles that will prevent buffer overflows.

  1. Will a more secure design of your web application also minimize the effects of a denial of service (DoS) or distributed denial of service (DDoS) attack on your web server? Why or why not?

Fully address the question(s) in this Assignment; provide valid rationale for your choices, where applicable.

Scareware versus Ransomware

Learning Objectives and Outcomes

  • Analyzing the impact of scareware and ransomware on a network.

Assignment Requirements

Scareware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software. Ransomware is a type of malware designed to hold your data hostage.

Answer the following question(s):

  1. Which type of infection—scareware or ransomware—poses a greater threat to a company network, and why?

Fully address the question(s) in this Assignment; provide valid rationale for your choices, where applicable; -.

TCP/IP and the OSI Model

Learning Objectives and Outcomes

  • Analyze the importance of TCP/IP and the OSI model to penetration testing.

Assignment Requirements

TCP/IP is a suite of protocols that controls the way information travels from location to location across a network or the Internet. The protocols that perform a wide array of functions.

Answer the following question(s):

  1. From the perspective of penetration testing, why is it important to understand TCP/IP and the layers of the OSI model?

Fully address the question(s) in this Assignment; provide valid rationale for your choices, where applicable.

Encryption Technologies

Learning Objectives and Outcomes

  • Analyze the use of encryption on business networks.

Organizations across private and public sectors may use a variety of encryption technologies for various purposes.

Answer the following question(s):

  1. What might be the effects of not using encryption on network or Internet traffic?
  2. Why might vendors propose proprietary encryption methods rather than using standard encryption technologies?

Fully address the question(s) in this Assignment; provide valid rationale for your choices, where applicable.

Hacker Motives

Learning Objectives and Outcomes

  • Analyze the motives of hackers in relation to corporations and government entities.

Assignment Requirements

Hackers can have various motives, many of which are similar to the motives for committing traditional crimes:

  • Status/validation: Hackers seeking to make a name for themselves
  • Monetary gain: Hackers wanting to generate revenue for themselves or deny revenue to a target
  • Ideology: Hackers using malicious software to carry out activist attacks to promote a particular agenda; may include hacktivists, nationalists, or nation-state actors

Answer the following question(s):

  1. What type of hacker do you think concerns corporations the most, and why?
  2. What type of hacker do you think concerns the federal government the most, and why?

Fully address the question(s) in this Assignment; provide valid rationale for your choices, where applicable.

Biometric Controls

Learning Objectives and Outcomes

  • Evaluate biometric controls for a scenario.

You want to install a biometric access control outside of a restricted room in your facility. You are considering a retina pattern system and a voice recognition system.

Answer the following question(s):

  1. What are the top three factors that will influence your decision, and why?

Fully address the question(s) in this Assignment; provide valid rationale for your choices, where applicable; -.

Enumeration and Security Policy

Learning Objectives and Outcomes

  • Determine how to address enumeration in a security policy.

Assignment Requirements

Enumeration is the most aggressive of the information-gathering processes in any attack. During enumeration, an attacker determines which systems are worth attacking by determining the value a system possesses. Enumeration takes the information that an attacker has already carefully gathered and attempts to extract information about the exact nature of the system itself.

Answer the following question(s):

  1. If you were an IT security manager, what would you include in your security policy regarding enumeration?
  2. If you worked as an attorney in the Legal department, would you want different language in the security policy? Why or why not?

Fully address the question(s) in this Assignment; provide valid rationale for your choices, where applicable. Research Assignment Due Week Eight (100 Points)
Research Assignment Due Week Eight (100 Points)
Please complete a minimum of One writing assignment for week 8 from the following:
Please note that grading criteria are included within the Word Document. Please carefully read
the directions. When completed, save your Word Document, and upload it to the assignment
folder.
Required Resources

Internet access
Submission Requirements




Format: Microsoft Word (or compatible) (or compatible)
Font: Arial, size 12, double-space
Citation Style: Follow your school’s preferred style guide.
Length: 2-3 Pages
Self-Assessment Checklist



I fully addressed the question(s) in the Assignment instructions.
I included justification or rationale for my choices, where applicable.
I followed the submission guidelines.
Security Features of Wireless Technologies
Learning Objectives and Outcomes

Identify security features of current wireless technologies.
Assignment Requirements
You are researching the following wireless security features for your company network:



WEP and WPA2
MAC address filtering
SSID broadcast
Answer the following question(s):
1. Which combination of wireless security technologies are most appropriate in the enterprise, and
why?
2. Which combination of wireless security technologies are most appropriate for public access, and
why?
Fully address the question(s) in this Assignment; provide valid rationale for your choices, where
applicable; -.
Secure Web Applications
Learning Objectives and Outcomes

Analyze secure web application design principles against specific attacks.
Assignment Requirements
You are attempting to strengthen the security of your company’s e-commerce web application. You
send a memo to the staff developers requiring the next version to use proper design principles that will
prevent buffer overflows.
1. Will a more secure design of your web application also minimize the effects of a denial of service
(DoS) or distributed denial of service (DDoS) attack on your web server? Why or why not?
Fully address the question(s) in this Assignment; provide valid rationale for your choices, where
applicable.
Scareware versus Ransomware
Learning Objectives and Outcomes

Analyzing the impact of scareware and ransomware on a network.
Assignment Requirements
Scareware is a type of malware designed to trick victims into purchasing and downloading useless and
potentially dangerous software. Ransomware is a type of malware designed to hold your data hostage.
Answer the following question(s):
1. Which type of infection—scareware or ransomware—poses a greater threat to a company
network, and why?
Fully address the question(s) in this Assignment; provide valid rationale for your choices, where
applicable; -.
TCP/IP and the OSI Model
Learning Objectives and Outcomes
▪ Analyze the importance of TCP/IP and the OSI model to penetration testing.
Assignment Requirements
TCP/IP is a suite of protocols that controls the way information travels from location to location across a
network or the Internet. The protocols that perform a wide array of functions.
Answer the following question(s):
1. From the perspective of penetration testing, why is it important to understand TCP/IP and the
layers of the OSI model?
Fully address the question(s) in this Assignment; provide valid rationale for your choices, where
applicable.
Encryption Technologies
Learning Objectives and Outcomes

Analyze the use of encryption on business networks.
Organizations across private and public sectors may use a variety of encryption technologies for various
purposes.
Answer the following question(s):
1. What might be the effects of not using encryption on network or Internet traffic?
2. Why might vendors propose proprietary encryption methods rather than using standard
encryption technologies?
Fully address the question(s) in this Assignment; provide valid rationale for your choices, where
applicable.
Hacker Motives
Learning Objectives and Outcomes

Analyze the motives of hackers in relation to corporations and government entities.
Assignment Requirements
Hackers can have various motives, many of which are similar to the motives for committing traditional
crimes:



Status/validation: Hackers seeking to make a name for themselves
Monetary gain: Hackers wanting to generate revenue for themselves or deny revenue to a target
Ideology: Hackers using malicious software to carry out activist attacks to promote a particular
agenda; may include hacktivists, nationalists, or nation-state actors
Answer the following question(s):
1. What type of hacker do you think concerns corporations the most, and why?
2. What type of hacker do you think concerns the federal government the most, and why?
Fully address the question(s) in this Assignment; provide valid rationale for your choices, where
applicable.
Biometric Controls
Learning Objectives and Outcomes

Evaluate biometric controls for a scenario.
You want to install a biometric access control outside of a restricted room in your facility. You are
considering a retina pattern system and a voice recognition system.
Answer the following question(s):
1. What are the top three factors that will influence your decision, and why?
Fully address the question(s) in this Assignment; provide valid rationale for your choices, where
applicable; -.
Enumeration and Security Policy
Learning Objectives and Outcomes

Determine how to address enumeration in a security policy.
Assignment Requirements
Enumeration is the most aggressive of the information-gathering processes in any attack. During
enumeration, an attacker determines which systems are worth attacking by determining the value a
system possesses. Enumeration takes the information that an attacker has already carefully gathered
and attempts to extract information about the exact nature of the system itself.
Answer the following question(s):
1. If you were an IT security manager, what would you include in your security policy regarding
enumeration?
2. If you worked as an attorney in the Legal department, would you want different language in the
security policy? Why or why not?
Fully address the question(s) in this Assignment; provide valid rationale for your choices, where
applicable.

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER