Preview

Unit 8 Assignment

Good Essays
Open Document
Open Document
594 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 8 Assignment
1. Complete the review questions:
a. A(n) __power surge____ is a momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
b. __Phishing____ occurs when a person attempts to glean access or authentication information by posing as someone who needs that information.
c. ___Mirroring________ is a fault-tolerance technique in which one device or component duplicates the activities of another.
d. __Clustering__ is a fault-tolerance technique that links multiple servers together to act as a single server.
e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
2. Using the seminar case; list some of the security breaches being practiced by the employees at the agency.
A few security breaches that the employees practiced where visible and the sharing and displaying of username and password information on post it notes. They should not have this information in clear view and should change them often. Employees where making the mistake of leaking information and visiting malware sites. They were also using common passwords which showed their lack of training. They need to be trained in network security and a strong policy needs to be enforced.
3. Create a security checklist for the Banana Tree Travel Agency!
Checklist:
* Are all the computers protected by virus software? * Is the virus software configured to scan all the important hard drives and files? * Does the virus program automatically update? * Is there a backup plan implemented for in case a virus does infect a computer or the network? * Are all firewalls in place and enabled? * Is all the confidential information properly store on a safe and secure area of the network? * Is there at least a 6-12 mixed characters strong WEP OR WPA password on wifi network? * Are there user ID and passwords on all the computers to prevent unauthorized access? * Are all employees informed about

You May Also Find These Documents Helpful

  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    4. Which of the following is a detailed written definition of how software and hardware are to be used?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    This can be through a desktop, company laptops, tablets, or any device that connects to the network. Employees should always remember to log off their workstations to avoid unauthorized use as well as not giving out their passwords to co-workers. A good idea is to enable the screen lockout when the desktop is idle. Also block or limit user rights to download, install software, and their access to certain files on the web. This can decrease the threat of viruses, malware, and any harmful files being seen, downloaded, and installed into the system through the workstation. It is very easy for threats to spread throughout the network so it is very important to have a top shelf Anti-virus in place and enable it to scan any CD, DVD, or USB drives inserted into the…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We will need to run intrusion detection software anti virus and view and asses logs to check for threats.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ittnt2670 Lesson 1

    • 489 Words
    • 2 Pages

    The feature that enhances fault tolerance by providing multiple data paths to a single server storage device is called _________.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fnce 601 Study Notes

    • 501 Words
    • 3 Pages

    To enhance the availability of a functional DHCP–based solution for automating IP configuration in a Windows 2000 network infrastructure, three things must be decided:…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    14. Which of the following is the term for the collection of rules that computers follow when formatting, ordering, and error-checking data sent across a network?…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project Deliverable 5

    • 899 Words
    • 4 Pages

    Secrecy ensures the safety of data from illegal access throughout an organization’s information planning, which extends to all data directly linked with the architecture’s applications, data stores, communication links and/or processes.…

    • 899 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1. Which of the following terms is the closest synonym to the term computer networking?…

    • 1375 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Computer viruses can be a nightmare. Some can wipe out the information on a hard drive, tie up traffic on a computer network for hours, turn an innocent machine into a zombie and replicate and send themselves to other computers. If you've never had a machine fall victim to a computer virus, you may wonder what the fuss is about. But the concern is understandable -- according to Consumer Reports, computer viruses helped contribute to $8.5 billion in consumer losses in 2008 [source: MarketWatch]. Computer viruses are just one kind of online threat, but they're arguably the best known of the bunch.…

    • 9130 Words
    • 37 Pages
    Good Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Homewoek Week 1

    • 1692 Words
    • 8 Pages

    c. Suppose we want to make four connections between switches A and C, and another four connections between switches B and D.…

    • 1692 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Internet and User Domain

    • 964 Words
    • 4 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate activity.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.…

    • 330 Words
    • 5 Pages
    Good Essays
  • Good Essays

    * Social engineering (For example, instead of trying to find a software vulnerability, a social engineer might call an employee and pose as an IT support person, trying to trick the employee into divulging his password. The goal is always to gain the trust of one or more of your employees)…

    • 1910 Words
    • 8 Pages
    Good Essays