What are the risks of using a public wifi network

Assignment Help Management Information Sys
Reference no: EM132000020

You have been asked back for a final interview with the Cyber Crime lab (CCL). The hiring decision is between you and one other candidate.

You are required to answer the following questions prior to the interview as a test of your knowledge so CCL can determine the most qualified applicant.

Each member of the CCL hiring team has created a short question. Answer each of these questions specifically, knowing that your answers may determine who will be hired.

Write a 5-page paper in which you answer the following:

1. As a field representative for your company, you are accustomed to traveling and working from hotels on the road. You always stay in a hotel with free WiFi so that you can work and check your email, as well as Skype with your family. What are the risks of using a public WiFi network? Short of finding a more secure network, what could you do to use this wireless network in a more secure fashion?

2. Why would a network administrator want to filter certain ports when capturing data such as FTP traffic? How can capturing network traffic help a security analyst?

3. A project team for your company has been working in the field at the client's gas refinery for the past 2 years. They are finishing the client's project and will be returning to the corporate office next week. After reviewing your incident tickets, you find that several people at the corporate office have reported receiving infected files from the field team.

You are responsible for creating a plan for receiving and re-introducing the field team's computer back into the company computer network. Briefly describe your plan for ensuring that any infected machines do not impact the corporate network. What should you consider when creating your plan? What lessons learned could be incorporated in the future?

4. Research Sam Spade to discover more information about the tools it includes. Briefly describe the purpose and expected result for each tool found on the Basic and Tools menu of Sam Spade.

5. Explain the specific knowledge you gained from the labs in this class, and how it could benefit CCL.

6. Use at least five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Reference no: EM132000020

Questions Cloud

How do these texts relate to larger themes : What points of comparison can you identify among these texts, and how do they relate to one another? How do these texts relate to larger themes and topics.
How much of good y will the consumer purchase : If the consumer maximizes their utility subject to their budget constraint, how much of Good X and how much of Good Y will the consumer purchase?
Evaluate the importance quality of service has to designers : Your design team presents a project to you, in which most inputs seem to have about a 1.5-second delay before a response.
Economy out of recession : Keynesian theory tells us that there are three approaches government can take to move an economy out of recession:
What are the risks of using a public wifi network : You have been asked back for a final interview with the Cyber Crime lab (CCL). The hiring decision is between you and one other candidate.
In what instances should goodwill be adjusted for impairment : How the use of the LIFO method to value its inventories will be impacted if a switch to financial statements prepared in compliance with IFRS will be made
Order for the discount cost to be justified : What would the sellers cost of capital have to be in order for the discount cost to be justified?
What are the earnings per share : The income tax rate is 30%. What are the earnings per share after the sale of 110,000 shares of stock
Provide the reasons for inclusion and the unique aspects : Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd