Preview

unit 7 security threats

Satisfactory Essays
Open Document
Open Document
449 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
unit 7 security threats
Unit 5 p2introduction of network tools.

The purpose of networking tools: Networking tools are the tools used in a network to manage the network and to make it simpler and easier for you to troubleshoot problems and fixing a network by providing effective support through software’s like HP openview, Cisco works and wireshark.
HP Open View
HP open view is a network and systems management monitoring tools. Also has a bundle of applications that perform a big range of services for a big network. It is mainly used for monitoring servers, devices, networks, databases & applications to make sure that faults are detected and alerted upon in a reasonable time. To control the situation when monitoring to make sure alerts is received before a fault happens. This give you time to fix a problem before it grows into a bigger problem and affects the business.
The bundle provides software for monitoring, configuring and testing along with fault detection and avoidance software
Purpose
Core OS baseline monitoring
Database monitoring
Application component monitoring
Application specific monitoring

Cisco Works
Cisco Works is a bundle of applications that can be used to configure LAN networks easily and efficiently, it includes error management software, Resource management software and a resource monitoring software. For example it provides real-time detailed detection, analysis, and reporting of device faults; often identifies problems before users realize they exist.

Purpose:
It simplifies the cisco network
Fault analysis is provided and tracking network responses
Workforce engine is also included.

Wireshark
Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. It lets you capture and interactively browse the traffic running on a computer network. Wireshark is a network protocol and packet analyser,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    Figure 2: The Wireshark splash screen After launching Wireshark, the Wireshark splash screen (Figure 2) appears while the application is loading program components into computer memory. After all components are loaded the splash screen disappears and the Wireshark application window appears (Figure 3). The Wireshark application window includes a menu bar, the main toolbar, and a filter toolbar. In Figure 3 the Capture menu has been expanded to show its menu choices. The Interfaces choice lets you assign a network adapter for capturing packet data transmitted over the network. Clicking the Stop choice terminates a capture session. The Capture Filters choice provides an interface for specifying conditions that hide unwanted information in the capture display. Notice that shortcuts for the Interfaces, Start, and Stop options are available on the main toolbar directly beneath the menu bar. The Filter…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computers use network protocols to communicate with computer network there are many network protocols as Hallberg (2005, p92) said “for example, transmission control protocols/internet protocols (TCP/IP) defines a set of rules used to send data from one node on a network to another node”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    There is a physical connection running between two computers that want to connect. This is made possible because phone lines that run from houses to switches to other houses that the phone company lets dial to each other. Or another alternative it could be network cables going to hubs and other computers. Also, it could be cable lines running to fiber optic lines, through routers. And lastly it could be radio waves that computers can broadcast and receive.…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    “Harm is to be taken to include not only ill treatment (including sexual abuse and forms of ill treatment which are not physical) but also the impairment of or an avoidable deterioration in physical or mental health and the impairment of physical, intellectual, emotional, social or behavioural development:” No Secrets (DH/Home Office 2000) based on the Children Act…

    • 511 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Assignment 1

    • 468 Words
    • 2 Pages

    that come with the operating system. You have also set up training to show and observe the IT…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Safeguarding Unit 204

    • 1034 Words
    • 5 Pages

    • Injuries in a variety of stages or injuries that have not received medical attention.…

    • 1034 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit514 Safeguarding4 1 3

    • 3187 Words
    • 9 Pages

    1.1 Analyse the differences between the concept of safeguarding and the the concept of protection in relation to vulnerable adults.…

    • 3187 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Another external force is technology. Since the software design and development for the monitoring system is outsourced to a firm in India it is difficult to control and monitor progress. Therefore, Mukerjee who is responsible for this task is spending most of his time in India and he can’t talk about the integration of software and hardware into the design with O’Brien who is senior engineering manager.…

    • 1070 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Network access to the plant data sources (Control systems, HMI systems and historians) that VantagePoint will…

    • 4728 Words
    • 26 Pages
    Satisfactory Essays
  • Powerful Essays

    The tool can be extensively used to monitor a weekly statistics for your application to be tested. It can gather CPU and memory level statistics .It can be used to raise alarm, if a threshold limit is being reached. This helps the developer to quickly look into the issue any time any hour. The data that it provides is both Graphical and excel representation which helps anyone to understand where and what the issue is. It had a feature called Dashboard which helps us in customizing the information that we need to monitor. Introscope® provides the ability to monitor, control and manage critical J2EE applications for higher availability, better performance and greater…

    • 988 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    What Is 8.2 Work Design

    • 815 Words
    • 4 Pages

    Designs and develops software application tools and utilities for diagnostics purposes, database modification, and CRT display enhancements…

    • 815 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab VIEW Case Study

    • 1767 Words
    • 8 Pages

    LabVIEW Express technology transforms common measurement and automation tasks into much higher-level, intuitive VIs, allowing beginners to quickly develop applications. For experienced programmers, LabVIEW's performance, flexibility, and compatibility is comparable to that of a traditional programming language such as C or BASIC. Indeed, LabVIEW uses similar constructs, such as variables, data types, objects, looping, and sequencing structures as well as error handling. LabVIEW also allows programmers to reuse legacy DLL and shared librariy code, and integrate with other software using ActiveX, TCP, and other standard…

    • 1767 Words
    • 8 Pages
    Good Essays
  • Good Essays

    With the use of such monitoring system, as explained by CMC industrial Electronics, operational efficiency is ensured. A lot of time delaying errors such as mechanical, human or Symantec errors will be avoided. Efficiency is also the key in allowing the company to evolve and develop. As the saying, being too careful will provide quality service that everyone would want, but it would take up a lot of time. By having a monitoring system to follow, the company is able to save time and provide maximum assistance and satisfaction to all the employees and clients.…

    • 10036 Words
    • 38 Pages
    Good Essays