Write response on the security

Assignment Help Computer Engineering
Reference no: EM132240595

Question: Provide a 50-75 word discussion reply to the following post below.

Setting up the proper security for a wireless network at a business can be difficult to do for multiple reasons. There are a few major things to consider when doing so to allow for the most optimal performance as well as security. One of the more important things to keep in mind is to use Enterprise WPA2. Doing this will allow an easy way to revoke an employee's user log-ins. Another important measure to take, which may sound ridiculous, is to have the proper physical security in place. This means locking the wiring closets and any equipment that is at risk to be tampered with. The last considerations I will touch on, among many, is to keep the software and any equipment up to date. This can mean performing regular updates, or routine upgrades of equipment.

Security breaches are not an uncommon occurrence nowadays. A pretty common breach that happened in February of 2018 was a breach of Under Armour's MyFitnessPal app which compromised many usernames, email addresses, and passwords. The intrusion was realized by Under Armour until March 25 of the same year. It then came out that Under Armour had used a hashing scheme called SHA-1 which had known flaws. Under Armour obviously stopped using SHA-1 to hash passwords and went to using bcrypt. This was a reminder for many people that corporate networks do not always use the best options out there.

References: Newman, L. H. (2018, July 11). The Worst Cybersecurity Breaches of 2018 So Far.

Parsons, Shaffer, Carey, Parsons, Oja, & Finnegan. (2015). IT 221: New Perspective on Computer Concepts 2016 Comprehensive + Microsoft Office 2013 Enhanced Edition 1st Course, 1st ed., Mason, Ohio: Cengage Learning.

Reference no: EM132240595

Questions Cloud

Describe some of the ways in which the manager behavior : Describe some of the ways in which the manager's behavior and actions toward in-group and out-group members varied.
Ceo about building a culture of respect and trust : What advice would you give to a company CEO about building a culture of respect and trust?
How would you apply your new knowledge : Consider the content of this class as they relate to information management/IT and managerial decision making. How would you apply your new knowledge?
Characteristics of effective and dysfunctional teams : What are characteristics of effective and dysfunctional teams in management?
Write response on the security : Setting up the proper security for a wireless network at a business can be difficult to do for multiple reasons. There are a few major things to consider.
How will emerging technologies impact the industries : How will emerging technologies impact these industries? Please provide clear examples. What changes will these industries have to make regarding the workforce.
Addie in the management field : Name and describe another model based on ADDIE in the management field?
What are at least two types of change : What are at least two types of change, and how are Lewin's and Kotter's approaches designed to handle change?
What are the principles behind the agile manifesto : Create an 8- to 12-slide Microsoft PowerPoint presentation that summarizes the Agile Manifesto. Present at least two points of praise.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd