Reference no: EM132563726
Part 1
As the use of wireless devices continues to expand, the need to secure these connections must follow suit. Cell phones now have the capability to create "hot spots," and many fast-food restaurants, hotels, and stores offer free wireless Internet connections.
Research and discuss a best practice list that an end user should take into consideration when connecting to a wireless access point.
As handheld devices continue to gain in popularity, the topic of wireless security continues to expand. It is now commonplace for companies to market a free Internet connection.
Research and discuss the security concerns that these free hot spots can create for the end user.
Part 2
The CEO of your company has recently contemplated introducing a wireless element to the network, as well as a virtual private network (VPN) server for the salespeople and individuals telecommuting from remote locations. Although this seems like a good idea, the CEO is requesting more information because he is worried that this may create a security issue and network congestion and response time.
Prepare a narrative to the CEO explaining what you would do to secure the new VPN to include an explanation of the VPN pre-shared key.
Discuss selection of wireless encryption methods, and compare and contrast WEP, WPA, and WPA2 to include an explanation of the bit strength for each.
Explain the concepts of war driving and the pros and cons of broadcasting the wireless SSID.
Research packet capture tools, and explain how they can be used for network management and resource balancing as well as their use to analyze a virus in the process of propagating across your network in real time.
Explain how the tool works and what information it is capable of capturing.
Select 3 types of information that could be captured from a packet capture tool, and explain how you would use it to either identify a security violation or an opportunity for performance optimization.
What is the output rate of this process
: The stages have output rates of 5 units/hr, 12 units/hr, 10 units/hr, and 7 units/hr, respectively. What is the output rate of this process
|
Which customer has a greater customer lifetime value
: Assume a 7% discount rate and that each customer has an expected lifetime of 5 years. Which customer has a greater customer lifetime value
|
Good domain model to fit your organization
: Based on your reading and labs that you may have started this week what do you think would be a good domain model to fit your organization and why?
|
Compute the value of closing stock at the end of the period
: Question - Blueberry Ltd uses the FIFO assumption with the periodic inventory method. Compute the value of closing stock at the end of the period
|
Discuss selection of wireless encryption methods
: Discuss selection of wireless encryption methods, and compare and contrast WEP, WPA, and WPA2 to include an explanation of the bit strength for each.
|
Discuss organization need for physical security
: Discuss an organization's need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs?
|
Integrated information system
: Industry example to explain why the company of your choice needs an integrated information system, such as an Enterprise Resource Planning (ERP) system.
|
Install applications on their company workstations
: In a corporate, networked setting, should end users be allowed to install applications on their company workstations
|
Enterprise resource planning
: As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity.
|