Premium Essay

Network Security Chapter 1-4

In:

Submitted By JanuBaba
Words 387
Pages 2
_____ ensures that only authorized parties can view the information. Either answer is correct Confidentiality Availability Integrity Authorization _____ ensures that the individual is who they claim to be. Authentication Accounting Access control Certification After an attacker probed a network for information the next step is to _______. penetrate any defenses paralyze networks and devices circulate to other systems modify security settings An example of a(n) _____ is a software defect in an operating system that allows an unauthorized user to gain access to a computer without a password. threat agent threat vulnerability asset exploit (AE) A(n) _____ requires a user to transport it from one computer to another. worm rootkit virus Trojan

Li downloads a program that prints out coupons but in the background it silently collects her passwords. Li has actually downloaded a(n) _____. virus worm Trojan logic bomb _____ is a general term used for describing software that gathers information without the user’s consent. Adware Scrapeware Pullware Spyware A _____ attack exploits previously unknown vulnerabilities. Was manually graded in d2L virus resource shock and awe surprise zero day A cookie that was not created by the Web site being viewed is called a ___________. first-party cookie second-party cookie third-party cookie fourth-party cookie Which of the following is not a DoS attack? Ping flood SYN flood Push flood Smurf

What type of attack intercepts legitimate communication and forges a fictitious response to the sender? Man-in-the-middle Interceptor SQL intrusion SIDS A _____ is a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is a potential harm. penetration test vulnerability scan vulnerability assessment risk appraisal (RAP) What is a current snapshot of the security of an

Similar Documents

Premium Essay

Instruction Plan

...Professional University,Punjab Format For Instruction Plan [for Courses with Lectures and Labs Course No CAP510 Cours Title COMPUTER NETWORKS Course Planner 15946 :: Gunit Kaur Lectures Tutorial Practical Credits 4 0 0 4 Text Book: 1 Behrouz A. Forouzan, Data Communication and networking, 4th Ed., Tata McGraw Hills year of publication 2006 Other Specific Book: 2 Andrew S. Tanenbaum,Computer Network 2nd Edition, PHI, Third Edition 1997 3 Comer E. Doughlas,Computer Networks and Internets, 2nd Ed., Pearson, 2000 4 W. Stallings,Data and Computer Communications, 7th Ed., Pearson, 2002. 5 Black U,Computer Networks-Protocols, Standards and Interfaces, PHI 1996 Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 6 http://authors.phptr.com/tanenbaumcn4/ 7 http://williamstallings.com/DCC6e.html 8 http://www.mhhe.com/forouzan/dcn4sie 9 http://en.wikipedia.org/wiki/Computer_network Salient Features Website on reference book Website on reference book website on text book Provides information on basic concepts of networking 10 http://compnetworking.about.com/od/basicnetworkingconcepts Networking Basics - Key Concepts in Computer Networking /Networking_Basics_Key_Concepts_in_Computer_Networking .htm 1 Approved for Spring Session 2011-12 11 http://www.cisco.com/web/learning/netacad/course_catalog/P Tools required to understand the...

Words: 1513 - Pages: 7

Free Essay

Student

...Application Services and Security Course Revision Table Footer Date: 09/30/07 10/10/07 Section: All All Reason for Change: New Curriculum QA Edits Implementation Date: December 2007 December 2007 © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys [Exam I —Unit 6] DATE: ________________________________ STUDENT NAME: ________________________________ COURSE NUMBER: ________________________________ INSTRUCTOR: ________________________________ ITT COLLEGE: ________________________________ General Instructions: 1. This is a closed-book, closed-notes Exam. No reference material (including assignments and lab) will be permitted for use during the exam session. 2. The exam contains true/false and multiple choice types of questions. 3. Please use the separate answer sheet provided to you for marking your answers. 4. Each question is worth two points. Good luck! © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys 1. The most common cause of security breaches is ______. a. no alarm system b. weak passwords c. untrained security guards d. poor perimeter lighting 2. Windows Server administrators should not use the Administrator account for everyday activity. They should use the ________ command, only when performing administrative functions. a. super user b. run as c. task manager d. power user 3. For organizations with wireless networks, deployment of ________ is necessary to vastly increase the security of the wireless access...

Words: 3277 - Pages: 14

Premium Essay

It255

...Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies...

Words: 4296 - Pages: 18

Premium Essay

It Services

...Business in 2013 — and Beyond ConnectWise.com Introduction 2013 is a year of great opportunity for Managed Service Providers (MSPs). As reported in the Wall Street Journal, IT spending by businesses with fewer than 500 employees is expected to grow by $4 billion to a total of $27.2 billion in 2015.1 The good news does not end there for MSPs. According to a recent study, 89% of MSP clients are “very” or “mostly” satisfied with their providers.2 In fact, a significant majority of clients reported that they intend to increase their IT spending in the next two years. Now is the time to position your company for growth by preparing to meet new and evolving client needs. 3 If you are an MSP seeking to grow or maintain your business in 2013 and beyond, market conditions are such that there will be many opportunities to acquire new clients or expand on the services provided to your existing clients. Your challenge is in differentiating your business from thousands of other providers in the marketplace who share your ambitions. A recent Wall Street Journal article revealed that there are now over 300,000 independent IT consultants and 114,000 small IT services companies providing support to small and mid-sized businesses (SMB).4 There may also be new competitors on the horizon as technology retailers such as Staples, Apple, and Best Buy eye the SMB marketplace and work to develop offerings that will compete with the traditional managed services offering. What are some ways that IT...

Words: 2822 - Pages: 12

Premium Essay

Minr

...Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 3.1 Document Revised: Document Published: November 25, 2013 August 9, 2012 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED...

Words: 126829 - Pages: 508

Premium Essay

Drew

...Syllabus NT2799 Network Systems Administration Capstone Project SYLLABUS Credit hours: 4.5 Contact hours: 56 (34 Theory, 22 Lab) Prerequisite(s): Completion of a minimum of 72 credits earned in the program of study including NT2640 IP Networking or equivalent. © ITT Educational Services, Inc. All Rights Reserved. -1- 13/01/2013 Network Systems Administration Capstone Project SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course provides an opportunity for students to work on a comprehensive project that includes the design, planning and implementation of a network solution for solving specific business problems. Common project management processes are applied to identify deliverables and outcomes of the project. MAJOR INSTRUCTIONAL AREAS 1. Project Management Techniques 2. A Fundamental Review of the Basics of Electronics in the AASNSA Program 3. Capstone Project 4. Research of Current and Emerging Technology COURSE OBJECTIVES 1. Apply important concepts of project management to the actual capstone project proposed for this course. 2. Use Microsoft Office Project to help plan and manage the actual capstone project. 3. Analyze the requirements for the capstone project. 4. Integrate and apply the knowledge acquired in the program to provide effective technological solutions for given problems. 5. Work in teams on a large-scope project. 6. Document solutions to a problem in detail...

Words: 7871 - Pages: 32

Premium Essay

Computer Networking

...demands and challenges of the time. Program: BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Program Objectives: The BS Information technology program includes the study of the utilization of both hardware and software technologies involving planning, installing, customizing, operating, managing and administering, and maintaining information technology infrastructure that provides computing solutions to address the needs of an organization. The program prepares graduates to address various users’ needs involving the selection, development, application, integration and management of computing technologies within an organization Course Title: Free Elective II (Information Assurance and Security) Course Description: This course provides a broad view of information assurance and security and its major subjects: protection of information assets; access to information system; hacking legislation and industrial standards. In addition this course will serve as a guideline for students to make their course selections. Course/Year and Section: BSIT...

Words: 1777 - Pages: 8

Premium Essay

Advance Issue in Ict

...ADVANCED ISSUES IN ICT | | | Semester | : | June 2013 | Course Leader | : | Iznora Aini Zolkifly | Office Location | : | Faculty of Business and Information Technology, Block B1-3A, Leisure Commerce Square | Consultation Hours | : | Tuesday : 2.30 pm – 4.30p.m Thursday : 2.30 pm – 4.30p.m jk | Telephone | : | 03-76277373 | E-mail | : | iznora@unitar.my | Tutors (Optional) | : | | | | | | | Course Synopsis The course contains current issues in Information and Communication Technology that focus on the area of information science, computer networking, multimedia, medical informatics and information security and computer forensic. Exposure through visitation, events, and seminar will be implemented in this course in order to obtain the global technology as it is impacting all walks of life all over the world. Course Objectives The objectives of this course are: * To expose students to the various area in IT through visitation and events. * To provide a series of seminar in order to gain current issues and trends in ICT. * To develop a knowledgeable and skilled computer professionals guided by the needs of companies and employers. Learning outcomes * Present verbally on current issues in different areas of information and communication technology through group presentation and discussions. * Summarize the latest technology offered in order to solve the real world problem. * Document the finding on current issues and trends in ICT from...

Words: 832 - Pages: 4

Premium Essay

Dfhdfh

... |[pic]www.csudh.edu | | |[pic] | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: |_15_ Weeks | |Web Companion |N/A ...

Words: 1433 - Pages: 6

Premium Essay

Computer Tricks

...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...

Words: 61838 - Pages: 248

Premium Essay

Vulnerability Mangement

...All other trademarks are the property of their respective owners.  Qualys, Inc. 1600 Bridge Parkway Redwood Shores, CA 94065 1 (650) 801 6100 Preface Chapter 1 Introduction Operationalizing Security and Policy Compliance..................................................... 10 QualysGuard Best Practices ........................................................................................... 11 Chapter 2 Rollout First Steps First Login......................................................................................................................... Complete the User Registration.......................................................................... Your Home Page................................................................................................... View Host Assets .................................................................................................. Add Hosts .............................................................................................................. Remove IPs from the Subscription..................................................................... Add Virtual Hosts ................................................................................................ Check Network Access to Scanners ................................................................... Review Password Security Settings ................................................................... Adding User Accounts ................................

Words: 38236 - Pages: 153

Premium Essay

Test Paper

...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...

Words: 125224 - Pages: 501

Free Essay

Designing for Security

...Midterm Examination Written Responses Presented in ITS-331 Designing for Security By QUESTION 1 In Chapter 1 of Weaver, Weaver, and Farwood (2013), we considered various THREATS to network security, the FUNDAMENTAL goals of network security, and how LAYERED approaches to defense contributed to the overall security posture of an organization’s information infrastructure. Chapter 2 explored Transmission Control Protocol / Internet Protocol (TCP/IP), the Open Systems Interconnect (OSI) Model, and how various protocols operated within, as well as across OSI layers to enable telecommunications to function. In a scholarly peer-reviewed journal article entitled: "Cyber security in the Smart Grid: Survey and challenges," Wang and Lu (2013) examined security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the U.S. Smart Grid. Based upon what you read in Chapters, one, and two of Weaver et al. (2013), as well as the journal article, COMPARE and CONTRAST Vulnerabilities, Attacks, or Threats shared from the text against those provided within the journal article. IDENTIFY Three Similarities AND Three Differences that exists between the text and literature. Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. Weaver, R., Weaver, D., & Farwood, D. (2013). Guide to Network Defense and Countermeasures (third Ed.). Boston, MA: Course Technology...

Words: 1934 - Pages: 8

Premium Essay

Fnc1

...Study  Plan  for  FNC1     Financial  Accounting  Concepts  and  Procedures    Chapters  1-­‐4  and  Chapter  10   1. Understand  Basic  Accounting  Concepts  and  Principles   2. Know  what  items  are  shown  on  a  Balance  Sheet,  Income  Statement,  and  Statement  of  Owners   Equity   3. Know  the  Accounting  equation   4. Understand  debits  and  credits   5. Understand  the  timing  of  recording  transactions   6. Understand  when  revenue  and  expenses  are  recoginized   7. Know  how  to  calculate  depreciation  expense   8. Know  how  to  calculate  accumulated  depreciation     Long  Term  Liabilities    Chapter  14   1. Starting  on  Page  845  make  sure  you  know  the  4  types  of  Bonds  and  their  characteristics.       2. Make  sure  you  understand  Bond  issue  prices,    Bonds  issued  at  Par  Value,  at  a  Discount,  and  at  a   Premium.       3. Understand  how  to  record  interest  expense  when  bonds  are  issued  at  par  value,  a  discount,  and   a  premium.   Stocks  and  Dividends    Chapters  13   1. Make  sure  you  understand  dividends  and  dividend  policies   Statement  of  Cash  Flows    Chapter  16   1. 2. 3. 4. Know  what  a  Statement  of  Cash  Flows  is   Understand  the  Direct  and  Indirect  Method  for  preparing  a  Statement  of  Cash  Flows   Know  the  Catergories  shown  on  a  Statement  of  Cash  Flows.   Study  the  exhibit  on  page  940  for  the  indirect  method.    Know  what  gets  added  in  and...

Words: 985 - Pages: 4