Why and how would you suggest testing security

Assignment Help Computer Network Security
Reference no: EM131131974

Disscussion reply to the question asked from students minimum words count 50 each

1: Security testing is performed in order to find flaws in security and also finding vulnerabilities and weaknesses in software applications. As we have learned from security breaches of systems at retailers like Target and Home Depot, we see the importance of ensuring that security testing efforts are up to date. I believe the main objective of security testing is to find out how vulnerable a system is and to determine whether its data and resources are protected from potential intruders. With online transactions increasing security testing is one of the most critical areas of testing all web applications

2:. Why and how would you suggest, testing security?

3: How do you recommend protecting your environment from malicious software?

4: Please describe issues related to wireless security?

5: George, good post and good point, "there are many security issues when it comes to wireless" and I like your advice about how "network administrators must be aware of these risks, and stay up-to-date on any new risks which might be out there," great points.

Throughput - poor power connection and limited connection.

Bottlenecking - high volume of traffic, happens during certain times of the day. An example would be apartments, hotels, and anywhere wireless connections are shared.

Hacking - wireless system is not secure.

George and class, how important are passwords? And how often should they be changed.

6:I agree on your definition of security testing. Security testing is important in making sure everything is working properly and up to date with the latest protection. There has been large organizations that have been victim to hackers like you mention. Recently I heard that Wendy's had a breach of people's credit cards and personal information being out. I believe having security testing more often for these large organizations would at times prevent things like this from happening. It's scary knowing that you can buy something as simple as a shake and loose thousands of dollars from your credit card information being stolen.

Reference no: EM131131974

Questions Cloud

Assuming the shares are held in the treasury : Kwun, Inc. purchases 1,000 shares of its own previously issued $5 par common stock for $12,000. Assuming the shares are held in the treasury, what effect does this transaction have on
Write a sample portion of an emergency plan : write a sample portion of an emergency plan for that section for your hometown or another municipality of your choice.
Do you agree or disagree : You have just been told, “Because we are going to finance this project with debt, its required rate of return must exceed the cost of debt.” Do you agree or disagree? Explain.
For what reasons might a company like ibm repurchase some : For what reasons might a company like IBM repurchase some of its stock (treasury stock)?
Why and how would you suggest testing security : Why and how would you suggest, testing security? How do you recommend protecting your environment from malicious software?
Which external factor has greatest impact on social class : In evaluating the U.S. Census projection data, determine which external factor has the greatest impact on social class. Predict two ways that social class will affect consumer behavior in the next 10 years.
Why is the cost of capital measured on an after tax basis : Why is the cost of capital measured on an after-tax basis? Why is use of a weighted average cost of capital rather than the cost of the specific source of funds recommended?
The market price of the shares at the time of the exchange : Land appraised at $80,000 is purchased by issuing 1,000 shares of $20 par value common stock.
Explain competitive analysis of organization and offering : Explain a competitive analysis of the organization and offering. Describe your target market in detail, including information on the geographic, demographic, psychographic and behavioral factors used to choose your market segment.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

  Mitigating dos attacks against broadcast authentication

Mitigating DOS Attacks against Broadcast Authentication in Wireless Sensor Networks

  Case study incident-response policy-gem infosys

Case Study Incident-Response Policy; Gem Infosys, Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days

  Decrypt the ciphertext message uw dm nk qb ek which was

decrypt the ciphertext message uw dm nk qb ek which was encrypted using the digraphic cipher that sends the plaintext

  Information security

Write the word "statistic" without the repeated letters. Then complete the cipher with the unused alphabet characters.

  Summary of network vulnerabilities that you uncover

Your first milestone consists of two deliverables: a Visio diagram that depicts your interpretation of the current network and a written summary of network vulnerabilities that you uncover

  Public- and private-key pair

Public- and private-key pair (Group Project) This is a 2-Week project that contains two main tasks. You need to manage your time well to be able to finish both tasks on time. The submission of the final document is due by Wednesday of Week 4,

  The classification is revealed by analyzing the information

The classified information is contained in the existing document and has been paraphrased in the new document. The SCG identifies the test firing dates as Secret information. No additional interpretation was needed to identify this information's c..

  Problem on ethereal lab

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ("sniffs") messages being sent/received from/by your computer

  Question about communication

Communication is valuable; a main part of this is the ability to provide management the information they required, when they require it.

  Security domains of a typical it infrastructure

Analyze the seven security domains of a typical IT infrastructure and determine which two of the seven you would implement first for a nationwide bank. Explain your rationale for your choice.

  Explain simple issue specific security policy in school

Rrules and regulations you have been provided with in your institution.does your school have a similar policy?does it contain all the elements listed in the text?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd