Preview

Business Data Networks and Telecommunication

Satisfactory Essays
Open Document
Open Document
2613 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business Data Networks and Telecommunication
Panko and Panko
Business Data Networks and Telecommunications, 8th Edition

1

Chapters 1–4: Introductory material
Chapters 5–6: Switched networks
Chapter 7: 802.11 standards and operation
Chapter 8: 802.11 security, 802.11 management, other local wireless technologies, and cellular technologies

Chapter 8

Chapters 9–10: Internetworking
Panko and Panko
Business Data Networks and Telecommunications, 8th Edition
© 2011 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 11: Applications
© 2011 Pearson Education, Inc. Publishing as Prentice Hall

2

802.11 Security
Drive-By Hackers
◦ Sit outside the corporate premises and read network traffic

802.11 LAN management

◦ Can send malicious traffic into the network
◦ Easily done with readily downloadable software

Other local wireless technologies

War Drivers
◦ Merely discover unprotected access points— become drive-by hackers only if they break in

Cellular technology
© 2011 Pearson Education, Inc. Publishing as Prentice Hall

◦ War driving per se is not illegal
3

© 2011 Pearson Education, Inc. Publishing as Prentice Hall

Unprotected Access Points

Rogue Access Points

◦ Drive by hackers can associate with any unprotected access point.

◦ Unauthorized access points that are set up by a department or an individual

◦ They gain access to the local area network without going through the site firewall.

4

◦ Often have very poor security, making drive-by hacking easier
◦ Often operate at high power, attracting many hosts to their low-security service

© 2011 Pearson Education, Inc. Publishing as Prentice Hall

5

© 2011 Pearson Education, Inc. Publishing as Prentice Hall

© 2011 Pearson Education. Doing business as Prentice-Hall

6

Panko and Panko
Business Data Networks and Telecommunications, 8th Edition

Core security protocols protect communication between a wireless client and a legitimate access point.
They provide

You May Also Find These Documents Helpful

  • Best Essays

    IEEE 802.11 – Wireless LAN • http://www2.rad.com/networks/2005/wirelesslan/main.htm • Up-to-date information on Wireless LANs. Technical/Magazines Articles…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    * Designed to remain undetected in order to gather information over prolonged periods. This type of attack has been observed in other large-scale data breaches that caused large numbers of identities to be exposed…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Business Data Model

    • 3130 Words
    • 13 Pages

    What is the probability that a randomly selected order will require between two and three minutes?…

    • 3130 Words
    • 13 Pages
    Good Essays
  • Powerful Essays

    1. Why is technology considered "invasive"? A. Technology is an integral part of our personal, as well as our professional lives. B. Technology has destroyed many values of society. C. It has forced certain businesses to shut down for good. D. Technology requires that employees work more than 40 hours per week. _____ deals with the planning for, development, management, and use of information technology tools to help people perform all tasks related to information processing and management. A. Management by objectives B. Management information system C. Transaction processing system D. Executive information system Data refers to ____. A. factual information that a person knows B. raw facts that describe a particular phenomenon C. knowledge acquired through study, experience or instruction D. information that have a particular meaning within a specific context Information refers to ____. A. a message expressing an opinion based on incomplete evidence B. a collection of facts from which conclusions may be drawn C. is data that have a particular meaning within a specific context D. raw facts that describe a particular phenomenon What is the primary difference between data and information? A. Information is processed to get data. B. Data is processed to get information. C. Data, unlike information, is related to hardware. D. Data is stored, information is not. You rent a Blu-ray disc of "A Clockwork Orange" for $25. This is an example of ______. A. data B. information C. software D. information system The average price of a movie ticket in the city of New York. is $8. This is an example of _______. A. data B. information C. software D. metadata The grade you earn for a specific college course is _____ and your overall GPA is ____. A. data; information B. information; data C. knowledge; business intelligence D. business intelligence; information system _____ is collective information that gives you the ability to make effective, important, and often strategic…

    • 4453 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Communication is very important in the business world these days. It is done through many different ways where the sender will try to convey a message to the receiver to pass some sort of information along. Technology is a great tool to have to help send these messages especially in the business world, where some of these communications are done virtually through email. The communication process includes the environment where the message takes place, the sender, the message that is created, technology used to send the message, noise, the receiver of the message, and the feedback that is returned to the sender. These messages need to be clear and concise especially in the business environment because there are many things on the line that include money, potential sales, and business proposals. Business to business communication process includes the communication between two business entities, in which the one business entity perform the role of a sender and other one perform the role of a receiver. In other words, business to business communication describes the communication between businesses such as between a manufacturer and a whole seller or between a whole seller and a retailer. All other elements of this type of communication process is dependent on the environment and the purpose of the communication.…

    • 1514 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    1. Integrations allow separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems.…

    • 20337 Words
    • 139 Pages
    Powerful Essays
  • Satisfactory Essays

    A good communicator is an individual that can listen, organized, clarity, a being sincere. Understanding their communication style, because understanding your communication style is the key to being a great communicator whether it is being aggressive, passive, or passive aggressive. After knowing your communicating style you must be able to use your communicating skills in order to perform your job and make your company a success. And being a good communicator is being able to have the ability to be a great listener, and having the ability to comprehend written and spoken language, also to have the ability to interpret nonverbal cues, respect the other party and winning there the other party confidence, and a having a good memory.…

    • 1178 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Haden (2008). The OSI Model. Retrieved on January 11, 2008, from Data Network Resource. Website: http://www.rhyshaden.com/osi.htm…

    • 1615 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang…

    • 454 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Business Computing

    • 828 Words
    • 3 Pages

    Colin Hammer, of Hammer Wines has asked us to analyse the internet usage of his employees at Hammers Wines. After analysing the internet usage data himself he has considered an internet restriction at his office where staff members are only able to access certain websites, currently the only internet access restriction is for pornographic websites. Colin’s thoughts are that if the staff members are using the internet for other proposes and “cyberslacking” would decrease the employee productivity in the workplace, after submitting a proposal to his employees about the ‘internet usage ban’ Hammer Wine employees have criticised his proposal indicating that this ban would lower staff morale and chances of decreasing productivity more than it should have. Since Colin Hammer’s ideas weren’t as successful he has asked us to analysis his company internet usage data to provide ideas for a better policy to be implemented.…

    • 828 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: 1. Chartered Global Management Accountant, 2012, Porter’s Five Forces of Competitive Position Analysis, viewed on 28 December 2013 at…

    • 2115 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    PRIVACY ISSUES IN ONLINE SOCIAL NETWORKING: A SURVEY Rabia Khan, Suriya Gharib, Nargis Munir, Syeda Roshana Ali Naqvi rabia.khan1050@gmail.com, {suriya_rehman, nargismunir198, r.ali_naqvi} @yahoo.com Abstract With the advancement in internet technologies a new concept for socialization emerge called Online Social Networks, that provide the user with facility to interact with people around the globe. This interaction provides many constructive features but some negative aspects also exist. This paper describes the concept of privacy in Online Social Network. First, various privacy threats are explored and brief description of these threats is provided.…

    • 5867 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    Business Information System

    • 2281 Words
    • 10 Pages

    – World’s best performing companies spent 7% more per employee on IT than typical companies – They recouped the investment fivefold in lower operational costs…

    • 2281 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Inputs, processing, and outputs are the three activities for the UPS’s package tracking system. The inputs include package information, customer signature, pickup, delivery, time-card data, current location, and billing and customer clearance documentation.…

    • 721 Words
    • 3 Pages
    Good Essays

Related Topics