Dicussion Question 1

Question # 00005548 Posted By: JKM Updated on: 12/17/2013 11:02 AM Due on: 12/18/2013
Subject Computer Science Topic Networking Tutorials:
Question
Dot Image

Select and respond to one of the following. If you use additional resources, remember to list them at the end of the posting.

  • Perform a limited risk management activity on your personal computer. Conduct an asset identification (hardware, software, devices, etc. ), threat identification, vulnerability appraisal, risk assessment and risk mitigation. Under each category, describe the elements that pertain to your system. What major vulnerabilities did you find? How can you mitigate the risks?
  • Your author discusses some of the issues associated with rogue access points. Find a least one article that focuses on a defense against rogue access points, and provide a summary as well as a link to the article. In addition, consider that many phones can now act as wifi access points. Would the defense you've summarized work with a wifi rogue access point?
  • Complete the network / password scanning lab using Wireshark (attached here). See the details in the attached document. Post your findings to the forum.
Dot Image
Tutorials for this Question
  1. Tutorial # 00005397 Posted By: neil2103 Posted on: 12/18/2013 03:26 PM
    Puchased By: 3
    Tutorial Preview
    The solution of Management of risk...
    Attachments
    Management_of_risk.docx (16.63 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    ...KM Rating Satisfactory result. Got A+ grade 01/31/2014

Great! We have found the solution of this question!

Whatsapp Lisa