preview

Nt1310 Unit 3 Term Paper

explanatory Essay
403 words
403 words
bookmark

1. Frequently, a security audits do not contain a comprehensive risk assessment; audits are intended to evaluate policy compliance, determine the effectiveness of existing security, and identify unknown vulnerabilities. A risk assessment starts with an inventory of company assets, and it is followed by an analysis of possible threats to those assets. The consequences to the organization if a threat materializes is the probability that the threat could occur. Also, security controls available to mitigate the risk, and the organization’s acceptable level of risk. 2. The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems. Metapackages give a user the flexibility to install specific subsets of tools based on your needs. Wireshark is a network protocol analyzer –popular for …show more content…

In this essay, the author

  • Explains that security audits do not contain a comprehensive risk assessment. they evaluate policy compliance, determine the effectiveness of existing security, and identify unknown vulnerabilities.
  • Explains kali linux penetration testing platform contains a vast array of tools and utilities that enable security and it professionals to assess the security of their systems.
  • Explains that wireless security is the prevention of unauthorized access or damage to computers using wireless networks.
  • Explains that wireless networks face different threats than wired networks. wireless networks do not have physical cabling to secure, so packets travel the airwaves and are vulnerable between transmitter and receiver.
  • Explains that it departments resisted the addition of mobile wireless devices to their areas of responsibility. while integration of laptops was unavoidable, many chief information officers and chief security officers were reluctant to include handheld devices under their supervision.

A wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is a notoriously weak security standard. 4. A wireless networks face different threats than wired networks. Wireless networks do not have physical cabling to secure, so packets literally travel the airwaves and are vulnerable between the transmitter and receiver. If no encryption is used, everything is sent in cleartext, including passwords and confidential data. A key component of security is a wireless security policy. The best tool for ensuring physical security is to provide security awareness training for users. People can avoid many pitfalls of wireless security with careful planning. Changing Default Hardware and Software Settings. Default settings for hardware and software in wireless configurations create serious vulnerabilities, so you should change several settings before installing a new

Get Access