Premium Essay

Nt1330 Unit 3 Term Paper

Submitted By
Words 1716
Pages 7
Question 1
What is a “honeypot”? Honeypot can be viewed as a technique or a specifically designed computer system intended to find out hackers or trap them and also to identify new techniques used for hacking. It is also designed to identify any nasty undertakings happening in internet.
Question 2
What is “blackholing”? Blackholing can be considered as an internet security technique against spam. It’s performed by the Internet Service Provider (ISP) which blocks the packets coming from certain domain or address thereby can prevent any types of malware and attacks and can limit the volume of spam inflowing to the system.
Question 3
What is “air-gap security”? Air-gap security can be viewed as security measure for both …show more content…
National Security Agency (NSA) has started the PRISM program post the incident of 9/11 to ensure more security. Through this program US government collects private information about users of famous Internet Services like Microsoft, Yahoo, Google, Facebook etc. Through PRISM the data will be collected directly from the servers of these Internet Services.
Question 8
In 2001 Bruce Schneier said “Complexity is the enemy of security”. Explain what he meant. Bruce Schneier is mentioning about the complexity in the software’s made which is really very complex which gives its developers a very hard time to identify the loopholes associated with it thereby making the software’s more vulnerable to external attacks and which ultimately compromises on the overall security of the end product.
Question 9
Explain the term “Defence in depth”. Defence in depth is more of a military concept where multiple layers of security will be implemented which makes it more difficult for the attackers to penetrate through the layers and completely conquer the system. This implements accurate use of people, process and technology and will primarily focus on delaying the attacks rather than preventing

Similar Documents

Premium Essay

Nt1330 Unit 3 Assignment 1 Term Paper

...Assessments: Gifts of Fortune has a warehouse (1200 sq. ft. with 20 employees (5 in the main office and 15 in the warehouse. Company is hiring 14 more warehouse workers, 2 more office clerks, and 3 field sales rep. A requisition for 16 desktops and 3 laptops are needed for new employees, the 3 laptops are for the sales rep. Migration of Windows XP to Windows 7 or 10 is also needed for this project. New printers will need to be purchased with copy/fax/scan capabilities. A refresh of the company’s switch from 8 port to a 32 port will also be needed. Routers to connect to the other warehouse to be rented will be needed to interconnect network. WAP’s will need to be installed on the warehouse for mobile devices. Current Solution Desktops (5), Laptop (1) Desktop (21), Laptop (4) Operating System – Windows XP Pro Windows 7 or 10 Printers – Dot Matrix (1), Laser (1) 5 new LaserJet Printers (Copy/FAX/Scan) 8-Port Switch 2 (32-Port) Switches and 2 Routers Cabling Update and replace Ethernet cables Speed Work with Service provider to increase bandwidth Applications – Access DB and Spreadsheets Purchase other SQL DB solutions Storage Invest on servers and Cloud Technology...

Words: 499 - Pages: 2

Premium Essay

Fsmo Role Ayer Nate Method

...Sole's Blog SOLVE YOUR IT PROBLEMS FASTER, SAVE YOUR FEET AND GET MORE TIME ON YOUTUBE! * HOME * * ABOUT SOLE VIKTOR * * USEFULL LINKS « How to publish a website with both Anonymous and Forms Based Authentication in ISA 2006 How to configure ISA 2006 with FBA for OWA and NTLM for Outlook Anywhere and Autodiscover in Exchange 2007 » How to place FSMO and Global Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master...

Words: 10360 - Pages: 42

Premium Essay

Nothing

...practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44

Premium Essay

Unit

...opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could be (but are not limited to): Install/maintain/upgrade site LAN cabling/wiring Survey, inventory and document networking layout and assets Install, configure and/or support Windows 7 desktop as network clients Install, configure and/or support Windows Server 2008 for a network Install, configure and/or support a site LAN (local area network, wired or wireless) General network user...

Words: 6762 - Pages: 28