Premium Essay

Nt1310 Unit 3 Research Paper

Submitted By
Words 1738
Pages 7
4. | Counter Measures
Vulnerabilities are caused by different forms of attack on the smartphones. To prevent or reduce the chance of the smartphones being attacked, various counter measures can be taken or applied to the smartphones to increase security and build defences against attacks.

4.1 Smartphone Browsers
The web browsers on smartphones such as the Opera browser, the Mozilla Firefox web browser, the Safari, and other in-app browsers are vulnerable to attacks such as Injection, XSS and Sensitive Information Disclosure when user is surfing the internet or opening a link from an application or message.

4.1.1 Defence using Security Plugins and Extensions
Security plugins and extensions are not readily available or found originally on the purchase of the smartphones, so one …show more content…
To reduce the risks, always check the authenticity of sites, and avoid sites that require credentials to be given. Also, at open hotspots, use VPN (Virtual Private Network) for connections.

4.3.3 Defence for Cloud
When using cloud for online data storage, make sure to never reuse old passwords or create simple passwords for easy memorization. Set answers for security or password reset questions to those that are really unique to yourself, but make sure it is something that can be easily remembered. When deleting photos or information on cloud, make sure any other backups or shadow copies are also deleted, to prevent unnecessary leakage of information. It is for the best if any important information or data is avoided from being stored in the cloud data storage.

4.3.4 Defence Application
Network traffic can also be used to check for any potential attack if it can be captured by mobile applications to filter unusual browser activities and malicious website fingerprint. Also, do not ignore any security warnings given.

4.3.4.1

Similar Documents

Premium Essay

Nt1310 Unit 3 Research Paper

...Charging Twist to open the bottom cover and connect to the Mini USB: Solar panel - it runs automatically (charge complete requires approximately 6~8 hours under the sun with minimum 60,000 lux) AC adapter - USB should be well-connected first, then insert the plug to the socket (charge complete requires 6~8 hours based on DC5V / 1A output) The green light appears while charging, and disappears when charge complete. Power Indication (for reference only, real power is based on real discharging of the device ) Red: low power and please charge. Green: Sufficient power. LED Light Engine with adjustable 4 modes 1 st. press: normal 2 nd. press: bright 3 rd. press: flashing 4 th. press: head light 5 th. press: off Important Instruction 01. Do not disassemble, modify the device or charge...

Words: 558 - Pages: 3

Premium Essay

Nt1310 Unit 3 Research Paper

...However, this authentication method is problematic if the two factors are compromised; the attacker can successfully obtain the password and any user data stored in the smart card. Three-factor authentication can help avoid this problem and enhance system security.   Owing to the singularity, biometric authentication protocol is ideal for user authentication, and addresses the weakness of password and smart card methods. The users can use their own biometric characteristics, such as fingerprint [3], voiceprint and iris scan. Biometric characteristic identification systems offer reliable authentication because biometric characteristics cannot be copied, stolen or easily lost. Although there are many advantages in using biometrics, this approach still has some shortcomings. For example, biometric characteristics cannot be easily changed or replaced. For these reasons, there is a demand for a more secure protocol like three-factor authentication. The three-factor authentication method in this paper uses a username, password and unique id of device for device authentication/verification. The authentication is based on the characteristics of all three factors. Without device authentication (unique id of device) user can not encrypt the file or decrypt the file. The advantages of this three factor protocol are device authentication that is not applied in previous three-factor protocol. By using device authentication the system become most secure compared to previous protocols. 1.0.1 Encryption...

Words: 640 - Pages: 3

Premium Essay

Nt1310 Unit 3 Research Paper

...Improve the sound of your device with the Logitech S-120 computer speakers. The system features a headphone jack for private listening when you are in public areas. Each speaker produces 1.15 watts of stereo, giving you audio that fills a room well when spread a few feet apart. With a frequency response of 50 to 20,000 Hz, the speakers make rich, clear sounds for your listening pleasure. A single knob conveniently acts as the on/off switch to adjust the audio. The versatile speakers are compatible with desktop computers and handheld portable devices. A glossy black finish adds to its aesthetic appeal. Place this stylish Logitech S-120 dual speaker system anywhere in your home or office. The 2.6 W RMS power speakers have a lightweight design. At only 7”H x 2.5”W, the system is small enough to fit on a desk or behind a monitor without interrupting your workflow. Each stereo speaker has grips on the bottom to keep them in place. Housed in durable, hard plastic with metal grills, the cone-top speakers have a flat back. A single hole in the back of the black speakers allows for wall mounting. You can even plug the system into the headphone jack of your LED/LCD TV. In fact, it works with any type of computer and portable device with a 3.5 mm jack. Amp up the volume with this portable Logitech S-120 multimedia speaker system. You’ll enjoy clear audio on your barely audible devices. The system delivers rich, acoustic audio via 5.2 watts of peak power output (2.6W RMS power). The black...

Words: 524 - Pages: 3

Premium Essay

Nt1310 Unit 3 Research Paper

...What kind of oils pop popcorn most efficiently? Included in this project is oils and popcorn kernels. The oils used in this project are vegetable oil, coconut oil, and avocado oil. Vegetable oil is use cooking purposes such as dressings, and all-purpose cooking. Coconut oil is a replacement for butter in cooking and baking for vegans, and its flavor is a natural sweetness. Avocado oil can be used for baking, dressings, on top of foods, and can replace mayo and butter. Coconut oil is a fatty oil that is contained from the coconut and used in candles and confections and cosmetics. This oil also has a lot of benefits to it. It benefits weight loss, better brain function, skin health, and etc. it benefits weight loss because of its fatty acids, with powerful effects on metabolism. The oil can help you burn more fat, can kill harmful microorganisms, and it can reduce your hunger and help you eat less. Coconut oil does help you burn fat especially harmful abdominal fat. Skin health is also a benefit because it is naturally antifungal and antibacterial. Coconut oil can be used for skin as a natural moisturizer. And can penetrate human’s hair better than other oils. ("10 Impressive Health Benefits of Coconut Oil", 2016) There are many uses for coconut oil. It has a sweet flavor, which makes it great for baking sweet treats. Also, good for frosting and sautéing. More uses are moisturizer for skin, homemade soaps, conditioner, weight loss, energy booster, cold sores...

Words: 873 - Pages: 4

Premium Essay

Nt1310 Unit 3 Research Paper

...SET-UP OF HARDWARE The system will be built based around the Arduino Mega as the main board and the three main components for the circuit to be used are Wi-Fi, Bluetooth, and GSM modules. The Arduino Mega 2560 will serve as the main component of the system while the other modules will be responsible for the collection of data from the user. For the Wi-Fi connections, the Arduino Ethernet module will be connected to the Mega via its respective pins. On the other hand, the Arduino JY-MCU HC-06 will be responsible for the Bluetooth connections and will be connected to the Mega in pins 6 and 9. After those connections are set, the GSM module SM5100B will be attached to pins 1 and 4 into the main board and will be used for the GSM capabilities of the system. Once the main circuitry is set, the relay module can now be attached to the respective wirings of the appliances and will be responsible for receiving the output commands from the main board. The module will act as the receiver for the appliances and will be responsible for conveying the commands given by the main board from the user. SET-UP OF SOFTWARE C++ program language will be used as the main software language of the system. The code will be designed accordingly on the response of the circuit in the system. In order to set up the main program of the Arduino system, the mega will be connected into the PC/laptop via USB first and its code will be written next through the Windows application Arduino CC software. Once that is...

Words: 456 - Pages: 2

Premium Essay

Nt1310 Unit 3 Research Paper

...Easily expand the storage capacity on your desktop or network-attached storage server with the Seagate BarraCuda ST2000DL003 Green Hard Drive. Focusing on a low power, energy efficient design, these 5900RPM drives are ideal for both performance data storage and gaming. This drive works with most computers, and is compatible with Windows 7 and above, Linux, and OS X Macintosh PCs. The Seagate BarraCuda ST2000DL003 drive also runs cooler and quieter than higher-RPM hard disk drives, giving it a longer lifespan. The CC32 firmware also feature several advantages that require no additional software or configuration on the part of the user. The BarraCuda Drive is a full-size 3.5" form factor HDD with a SATA 6Gb/s interface and 64Mb cache size. This allows for a significantly high speed access rate to the very large 2TB SATA drive for low-latency I/O. This is the highest speed SATA connection for this size of hard drive that have a matching mounting post layout. This allows for easy addition to systems with an available 3.5" hard drive slot, regardless of the original system's age. Seagate's SmartAlign technology allows seamless transition from the traditional 512 sector format to the Advanced Format (AF) 4K sector design. This eliminates the risk of partition mis-alignments and performance issues when migrating to this drive from an older legacy system. The AF sector design allows hardware to read from newer, larger disk in larger chunks, vastly improving data throughput rates. The...

Words: 496 - Pages: 2

Premium Essay

Nt1310 Unit 3 Core Research Paper

...i3 processors mainly differentiated by the number of cores. Difference in cores limits the response time and compatibility with different types of memory capacities. Cores functions depends on the type pf chipsets embedded. Intel chipsets that goes with I series cores ranges from K series to x99 series chipsets. This allow powerful gaming, graphic creation and we building offering the quickest response command. Core compatibility with your operating system depends on the motherboard. Intel offers easier management and recovery on times of hard disk drive failure and data corruption. Next thing to consider is choosing the right graphic card for you i7 powered PC. Choosing the right core and system for you depends on your needs. If for research and basic graphics you may use basic cores but a more complexed core for your IT frame working and web building, a faster multifaceted core like 15 and 17 could come handy....

Words: 561 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 3.3 Research Paper

...Abstract—One main advantage of open-source technologies such as Linux is the increased security. In this paper we will discuss the type of attacks on operating system Linux Kernel such as side channel vulnerability, introduced in a recent TCP specification (RFC 5961) fully implemented in Linux kernel version 3.6, how it is spreads and what are its impact. This vulnerability allows a blind off-path attacker to infer to any two hosts on the Internet that are communicating using a TCP connection. Such an off-path attacker can also infer the TCP sequence numbers in use, from both sides of the connection; allowing to cause connection termination and perform data injection attacks. The proposed elimination methodology to the cause of the problem are also discussed. Keywords: Operting system: security attacks; denial of service;...

Words: 1290 - Pages: 6

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

...ASSIGNMENT 3 1. Using only the following protocols (ARP, DNS, HTTP, ICMP, IP, NTP, RTP, UDP, TCP), describe the steps involved when the Internet host red.color.net pings another host green.paint.net. Describe this step by step, in detail- what happens in each host. Assume all caches are empty (i.e. No name or address resolution has been done, yet) You have to think through the whole chain of how address discovery works and what protocols are used at every step. Let red.color.net be Host A with IP Address 192.168.1.100 and green.paint.net be Host B with IP Address 192.168.1.200. Let’s assume that Host B have a web server running on it, and its port 80 is ready to accept http connections. Now, we open a web browser in Host A and type the URL...

Words: 977 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

...If you opt to use a wired network connection, attach a network cable to the Ethernet port on Surface Dock. 3. Locate the USB ports on the Surface Dock and connect your computer peripherals. 4. Locate a Mini Display Port on the Surface Dock and connect a cable from the monitor to it. You may need to purchase another cable or an adapter if you discover that the monitor cable does not have a Mini DisplayPort connector 5. Connect any accessories for audio purposes, such as speakers or headphones. Without outer speakers, it may be impossible to hear audio when you are using your Surface Pro 4. If this so, go to Troubleshoot Surface Dock on Surface.com to find out how to switch to the built-in speakers on your Surface. With this done you can now connect to your monitors and peripherals with a sole connection to the power port on your Surface Pro: 1...

Words: 1020 - Pages: 5

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

...Save Incase you are unable to find the router IP address, it can be found using command prompt. For the same, follow below steps 1. Click Windows + X 2. Power User Menu opens up. 3. Then Click Command Prompt. 4. Type- “ipconfig”. This will display all the connections established on your computer 5. Look out for “ Default Gateway” 6. This gateway is under LAN tab 7. The default gateway is basically the IP address of your route Why is critical to change username and password of your router? The routers shipped from manufacturers come with default password and username. The Manufacturers use a standard combination of username and password. Easy way of identification is seeing the sticker on the router hardware device. Example- Motorola uses Username as admin and password as admin or password. Similarly other players have basic passwords which mandatorily should be changed as soon as purchase is done to avoid any hacks/leaks...

Words: 494 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

...Name: MUTAIB HAIL ALSAHLI ID: 120004631 Answer, Question number 1, Before we talk about the differences there are Some people who may easily forget the fact that the USB Type-C and USB 3.1 are different from each other, considering the fact that both cross platforms were developed by the USB Forum (USB-IF) simultaneously, USB Type-C is a physical connector and USB 3.1 is a technology standard. Compatible devices can transfer data at a very high speed of up to 10GB per second.USB 3.1 standard allows for high-speed data transfer, but other devices such as tablets and smartphones might not transfer data that fast's Type-C and USB 3.1 are often confused with each other. The main difference between the two is that USB Type-C is developed to support USB 3.1 signals. Some devices might have Type-C connectors which only support the older USB standards such as USB 2.0 and USB 3.0. With more and more devices such as the new Lumia, Nexus are getting equipped with USB Type-C connectors combined with USB 3.1 support, the latest smartphones' batteries are sure to charge even faster. Some limitation of USB type-c is that the new connector also has a disadvantage for example the people who have devices with USB Type-C ports cannot insert USB Type-A and USB Type-B cables in the plug without a compatible adaptor. Answer, Question number 2, ‎ A rendering video or a video renderer is actually the process of "computer drawing" which is being done by many softwares on the markets like "VMR-7"...

Words: 445 - Pages: 2

Premium Essay

Nt1310 Unit 3 Network Management Research Paper

...Network management strategies require you to ensure your network is setup to be able to function properly together. To ensure the network is setup to function correctly, the user rights control, mail server control, network setup are established to secure a network. Control of user rights will enabled the control of information and access across the network. User rights across the network will be controlled by group policies provided by Windows 7 Enterprise. Group policy will control how user access resource on shared drives and allow tunneling access through vpn when on a business trip. Group policy will allow ease of propagation of user rights across the network. It is important to control access on a mail server as spear phishing and other methods could allow access into your network. The control of mail server is provided by the Microsoft exchange Server which uses IMAPv4. This will allow a central control of the mail server enabling you to encrypt and use digital signatures to ensure the emails are from the authorized personnel and sensitive data is secure. Network interaction on how it is connected is important in any network system setup. The Cisco ASA 5500 is the IPS and front line point of security for the network. There will need to be considerable amount of rules and setting configured on the devices. It is always important to configure the firewall for the most efficient rules set possible because (K Yoon, 2010) " as the rule set grows larger, the number of configuration...

Words: 528 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 1 Research Paper

...issued by Apple and available on the web. All you need to do is click the link that matches up with your device and download the file to the desktop of the computer. Download and install the latest iTunes if you don't have it already. Upload the iOS 9.0.2 IPSW file that's on your desktop to iTunes and iTunes will flash that firmware on your device. iOS 9.0.2 IPSW links available to download: iPad Air 2 6th gen WiFi iPad Air 2 6th gen Cellular iPad Air 5th gen Cellular iPad Air 5th gen WiFi iPad Air 5th gen China iPad 4th gen CDMA iPad 4th gen GSM iPad 4th gen WiFi iPad mini CDMA iPad mini GSM iPad mini WiFi iPad mini 2 Cellular iPad mini 2 WiFi iPad mini 2 China iPad mini 3 China iPad mini 3 WiFi iPad mini 3 Cellular iPad mini 4 WiFi iPad mini 4 Cellular iPad 3 Wi-Fi 3rd gen iPad 3 Wi-Fi + Cellular GSM iPad 3 Wi-Fi + Cellular CDMA iPad 2 Wi-Fi Rev A iPad 2 Wi-Fi iPad 2 Wi-Fi + 3G GSM iPad 2 Wi-Fi + 3G CDMA iPhone 5 CDMA iPhone 5 GSM iPhone 5c CDMA iPhone 5c GSM iPhone 5s CDMA iPhone 5s GSM iPhone 6 iPhone 6 Plus iPhone 6s iPhone 6s Plus iPhone 4s iPod touch 5th-gen iPod touch 6th-gen...

Words: 545 - Pages: 3

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2