What are the risks of using a public wifi network

Assignment Help Management Information Sys
Reference no: EM132008408

Final Term Paper Project: Interview with CCL

You have been asked back for a final interview with the Cyber Crime lab (CCL). The hiring decision is between you and one other candidate. You are required to answer the following questions prior to the interview as a test of your knowledge so CCL can determine the most qualified applicant.

Each member of the CCL hiring team has created a short question. Answer each of these questions specifically, knowing that your answers may determine who will be hired.

Write a paper in which you answer the following:

As a field representative for your company, you are accustomed to traveling and working from hotels on the road. You always stay in a hotel with free WiFi so that you can work and check your email, as well as Skype with your family.

What are the risks of using a public WiFi network?

Short of finding a more secure network, what could you do to use this wireless network in a more secure fashion?

Why would a network administrator want to filter certain ports when capturing data such as FTP traffic? How can capturing network traffic help a security analyst?

A project team for your company has been working in the field at the client's gas refinery for the past 2 years. They are finishing the client's project and will be returning to the corporate office next week.

After reviewing your incident tickets, you find that several people at the corporate office have reported receiving infected files from the field team.

You are responsible for creating a plan for receiving and re-introducing the field team's computer back into the company computer network.

Briefly describe your plan for ensuring that any infected machines do not impact the corporate network. What should you consider when creating your plan? What lessons learned could be incorporated in the future?

Research Sam Spade to discover more information about the tools it includes. Briefly describe the purpose and expected result for each tool found on the Basic and Tools menu of Sam Spade.

Explain the specific knowledge you gained from the labs in this class, and how it could benefit CCL.

Use at least five quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

The specific course outcomes associated with this assignment are:

Explain the process of network traffic analysis and sniffing, and their appropriate tools.

Analyze wireless network vulnerabilities exploited by hackers.

Examine the appropriate methods for performing incident handling.

Use technology and information resources to research issues in cybercrime techniques and response.

Write clearly and concisely about topics related to cybercrime techniques and response using proper writing mechanics and technical style conventions.

Reference no: EM132008408

Questions Cloud

What is the total book value of debt : Jim's Mobile issued a 30-year, 7 percent semiannual bond 9 years ago. The bond currently sells for 88 percent of its face value.
What is a professional organization you would like to join : What is a professional organization you would like to join? (This is not a job.) How can joining this organization benefit you in terms of networking?
What is the difference between an ids and an ips : What is the difference between an IDS (Intrusion Detection System) and an IPS (Intrusion Protection System).
What is the company wacc : Assume that the overall cost of debt is the weighted average of that implied by the two outstanding debt issues. Both bonds make semiannual payments.
What are the risks of using a public wifi network : Short of finding a more secure network, what could you do to use this wireless network in a more secure fashion?
Difference relevant to financial decision making : How does net cash flow differ from net income and why is that difference relevant to financial decision making?
Discuss the estimate cost tools and techniques : Discuss the Estimate Cost tools and techniques and how they're used to derive cost estimates. Discuss when during the project life cycle the tools should be use
Average length of the firm short-term operating cycle : Estimate the average length of the firm's short-term operating cycle. How often would the cycle turn over in a year?
Identify the three best practice you believe would be useful : Take a position on whether or not you would want to pursue a career as an IT auditor. Explain the key reasons why or why not.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop a list of some possible entities and attributes

System allows customer to select regular weekly items that are automatically shipped on a set schedule like milk and eggs .

  Promote a bill to allow casino gambling in your state

Discuss the pros and cons which might arise toward the passing or defeating of this bill. A 300 word response must be posted to the discussion forum

  Determine the user interface which is the most efficient

From the second e-Activity, examine the ease of use and the pros and cons of three (3) types of user interfaces available to the user today. Determine the user interface which is the most efficient and user friendly. Provide a rationale for your r..

  What is a128-bit encryption

What is a128-bit encryption? In terms of software available to the general public, is a128-bit encryption the strongest?

  Business process model and notation

Business Process Model and Notation

  Write essay on a special issue of a management journal

You have been asked to contribute an essay to special issue of a management journal. How corporate network management fits within commercial business operation

  Determine the selection of an operating system

What criteria must a new business use to determine the selection of an operating system?

  When is each type of testing appropriate

Discuss the advantages and disadvantages of each type of testing. When is each type of testing appropriate?

  How will pat respond and how will you respond to pat

Supply Chain Selection of vendors - How will Pat respond, and how will you respond to Pat?

  Explain the cycle of product quality

Implementing ERP usually requires major change in the way the enterprise is run and explain the cycle of product quality.

  New technology and old waysdoes the implementation of new

new technology and old waysdoes the implementation of new technology always mean the end of old ways of doing things?

  Operations and suplpy chain

Operations and Suplpy Chain - Draw a graph. Develop the equations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd