Preview

Unit 8 Assignment

Satisfactory Essays
Open Document
Open Document
380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 8 Assignment
Review Questions:
1. Complete the review questions: a. A(n) ____________________ is a momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.
Surge
b. ____________________ occurs when a person attempts to glean access or authentication information by posing as someone who needs that information.
Phishing
c. ____________________ is a fault-tolerance technique in which one device or component duplicates the activities of another.
Mirroring
d. ____________________ is a fault-tolerance technique that links multiple servers together to act as a single server.
Clustering
e. ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.
Encryption

2. Security Breaches:
Security breaches being conducted by the employees at the Banana Tree Travel Agency consist of the way they keep their passwords written down on a piece of paper or a little sticky note to remember what it is. By doing this, they create a security breach, allowing other employees to view what their user name and password may be to their computer. Vital and important information are now at risk and in harm’s way by exposing your password to everyone within your environment. In some cases, customers come back to the work stations accompanied by other employees and if a dishonest customer see your information, the network could be accessed.

3. Security Checklist: * Employees should have strong passwords containing special characters * Install antispyware to all computers * Install antivirus software to all computers * Use a firewall on the network * Use web filtering software on the network “all computers” * Frequent checks of the security on the network should be conducted * Strong Administrative password

4. List three viruses and how they affect network security, integrity and availability: Virus | Security | Integrity | Availability |

You May Also Find These Documents Helpful

  • Good Essays

    Unit 8 Assignment 1

    • 646 Words
    • 2 Pages

    Attenuation can cause performance issues because of dirty fiber end faces, excessive gaps between fibers or improperly installed connector offsets of fiber cores when mated. The second factor affecting splicing performance is called Angle Acceptance also known as Modal Dispersion. This has to do with a differential delay between the modes, which can cause for a lower bandwidth. The last and final factor is Chromatic dispersion which is the limited bandwidth of certain single mode optical fibers. This has to do with the length of light that is emitted through wave lengths. The best way to avoid these affects is to make sure the ratings match and the splicing is perfect, as well as the end faces meet.…

    • 646 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    4. Which of the following is a detailed written definition of how software and hardware are to be used?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Laptops and workstations have their own set of security risks associated with them. They are vulnerable to being compromised by malware, spyware, or even hackers that take advantage of certain exploits. Laptops, workstations and mobile devices are susceptible to malicious software attacks, theft or loss. Viruses and malware can affect these devices and are usually acquired through contaminated email attachments and hyperlinks that redirect the user to exploited web sites or are transferred through USB storage devices. Viruses and malware can also be acquired by downloading infected files or programs that are designed by hackers. Because of the need to protect systems against threats, all workstations and laptops should be secured with antivirus and firewall software and updated and patched on a regular basis to fix vulnerabilities with the software that hackers may exploit. Since the laptops are mobile by nature they are at risk of being stolen along with all of the data saved on their hard drives. The best security method for this would be to encrypt the hard drives on the laptops and where feasible only store sensitive data on corporate servers…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 9 assignment

    • 421 Words
    • 2 Pages

    Ans. Alpha and beta testing, staged rollouts it’s always valuable to get real-world feedback from users, especially before launch. Google Play makes it easy to distribute pre-release versions of your app to alpha and beta test groups anywhere in the world. You can start with a small group of alpha testers, then move to a larger group of beta testers. Once users are group of alpha testers, then move to a larger group of beta testers.…

    • 421 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web?…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    This disaster plan was put together to try and protect valuable information should it be attacked by hackers or threatened by a natural disaster. As this company grows, so will the value of the network and the information it retains. We want to ensure to the customer and the employee that this information is safe and not vulnerable to an attack. This plan was devised to help protect against failures such as the complexity of the system, accidental failure or a breech by hostile intent.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Ittnt2670 Lesson 1

    • 489 Words
    • 2 Pages

    The feature that enhances fault tolerance by providing multiple data paths to a single server storage device is called _________.…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    1. Which of the following terms is the closest synonym to the term computer networking?…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Weekly tasks or assignments (Individual or Group Projects) will be due by Monday and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus. NOTE: All submission posting times are based on midnight Central Time.…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    unit 2 assignment

    • 15807 Words
    • 77 Pages

    In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook):…

    • 15807 Words
    • 77 Pages
    Satisfactory Essays
  • Good Essays

    Flexible work timings

    • 1540 Words
    • 7 Pages

    b. Pass on new information. Also, address issues related to process faults or system inadequacies.…

    • 1540 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Personal data processed for any purpose shall not be kept for longer then is necessary.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays