Preview

Nt1310 Unit 3 Penetration Test

Satisfactory Essays
Open Document
Open Document
408 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Penetration Test
To provide the quality that has customers returning for our service, we design the project by doing a penetration test at the end. This is because we assure all our jobs to be secured and free from exploitable vulnerabilities at the end. So, with the penetration test we will simulate a hacker and try everything to break into the network and steal information. If we are able to breach the network we will fix the vulnerability. This will continue until there is no more way for us to get in. The idea behind our strategy is that if we cannot get in, then hacker will not be able to get in either. This signifies a high standard of quality.
Solution Testing
The network infrastructure was first tested with Cisco packet tracer to test the configuration

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 5 Case Study

    • 747 Words
    • 3 Pages

    Because of the specific words used that sentence they would have to use a direct distribution method.…

    • 747 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Check the linearity of the Black Box by connecting the DC Power Supply to the input of the Black Box, and the Multimeter to the output of the Black Box, then change the input voltage regularly and notice the changing in the output voltage of the Black Box.…

    • 237 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 2 Review Paper

    • 1508 Words
    • 7 Pages

    9- Which of the following stress or strength parameters is used in the computation of the force in an extrusion operation (one best answer): (a) average flow stress, (b) compression strength, (c) final flow stress, (d) tensile strength, (e) yield strength?…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    For simulations, we have used ns-3 simulator which is a discrete event network simulator. We have used ns-3 for evaluation of our algorithm for random sensor node deployment scenarios to find the sinks locations for a particular sensor nodes deployment.…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NIC test: It also monitors health of the other firewall by testing NIC status whether the link is up or down (cisco 2008).…

    • 480 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Case Study

    • 317 Words
    • 2 Pages

    I have attached question number 11 for everyone to review. This step is not completely done because we are missing expenses and revenues for 2017. The reason I am sending it out to you guys is so that you can see what I have done so far. This information may be particularly relevant to Jon. In the excel document, there are two tabs so far: the original budget, and expense scenario 1. The first tab is all the calculations I have done to get to tab 2. Also, In tab 1 I have made the following assumptions.…

    • 317 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Test

    • 1619 Words
    • 7 Pages

    Which part of a recipe tells what type of equipment is needed to prepare a recipe?…

    • 1619 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    You issued all of the commands required by the lab and you answered all of…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Test Paper

    • 381 Words
    • 2 Pages

    1. Create an insert function that will take nodes and add them up in the binary tree.…

    • 381 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Test Paper

    • 746 Words
    • 3 Pages

    We are running programs on a machine where values of type int have a 32-…

    • 746 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Some observations found about termites are that they live in moist, dark environments, they are sterile and lack eyes, and their primary task is to collect food. From this information the hypothesis that due to their lack of eyes, they use feeling of their skin to find what they are searching for and a pencil line would give a feeling of wood that would attract the termites. By making a course that split into two paths of a pen line and pencil line, the termites will prefer the pencil line and follow the pencil. Toward the end the termites were found mostly on neither pen or pencil therefore showing no correlation toward the feeling of pencil or pen.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Case Study

    • 685 Words
    • 3 Pages

    What can you do to benefit the server: Starting off, I would take care of the chat for the server so that the environment is family friendly. Later on, I would attempt to deal with more blatant rule breakers such as hackers and or people whom abuse glitches or bugs to take advantage of anything. If anyone breaks the rules with the exception of hackers (instantly taken action against) I will first give them a verbal warning so they know they shouldn't repeat what they just did. If did again, either action or another verbal warning will be issued but the third time will call for immediate action. Considering the timezones, I can catch the more 'blatant' rule breakers whom could be ruining the experiences of players in my timezone where other staff aren't online or…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    Deciding on which cybersecurity program to use to protect clients’ login and password is always a gamble. OAuth 1 and OAuth 2 are the two most popular protocols used to safeguard client information. This protocol is used by major corporations including Twitter (Twitter Developers Documentation, n.d.) and Instagram (Authentication, n.d.), OAuth or Open Authorization) is a program which was developed to protect client passwords and information from other third-party applications. Generally, O-Auth protects information through a protocol which requires the third-party system to request a token from the server to access the client’s information without knowing their password. According to Aaron Parecki, the manager of OAuth.net and an experienced O-Auth user, the Open Authorization 1.0 protocol was designed by a small group of developers from several websites and Internet Services (Hammer-Lahav, 2010) in 2007 tasked with standardizing other authorization protocols such as Flickr Auth and Google AuthSub. (Parecki, n.d.; Chae, Choi, Choi, Yae, & Shin, 2015) Parecki continues to describe the beginning of O-Auth 2.0. He says that the objective of OAuth 2.0 was to learn from OAuth 1 and “…update it for the emerging mobile application use…” as well as to streamline certain features which were overly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The three-assessment chosen is John Maxwell Leadership Levels Assessment (JMLL), Myers Briggs Type Indicator (MBTI), and DISC Assessment (dominance, influence, steadiness and compliance). JMLL Preslar focused on lifelong lessons clients will experience through: position, permission, production, people development, and pinnacle (2012. MBTI examined Rashid and Duys the perception and judgement toward different situation that could strengthen or weaken a person ability to live a fulfilling life or career (2015). DISC Newsome examined the influence personality traits have on decision concerning relationship, careers, and life (2000).…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Design a Campus Network

    • 3115 Words
    • 13 Pages

    Note: The project work can be completed using the Remote Lab facility available for the…

    • 3115 Words
    • 13 Pages
    Satisfactory Essays