Question

As the network security administer, you are concerned the wireless network has been compromised even though...

As the network security administer, you are concerned the wireless network has been compromised even though all of the proper security standards and controls are in place and functioning within specification.

a. Describe what you should be looking for next and why?
b. What devices could be used?
c. Who be the likely hacker?
d. How can you tell the difference between the two types of potential compromises?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer:

Given that:

a. Describe what you should be looking for next and why?
It could be possible that the firmware of the device may get vulnerable or hacker may found the loophole of the present firmware to enter into the network by some ARP spoofing and DNS redirecting and other tools.
so, asap update firewall and all the software which are configured in the present senario.

b. What devices could be used?
Latest router should be use with the latest firewall inbuilt as well as hardware firewall with advanced penetration attack protection.

If we talk about the hackers they have more powerful tools as well as the biggest tool is their MIND which they use more then any administrator do rather they are not alone they are in group so to defeat a gang administrator need a gang of talents.

c. Who be the likely hacker?
sometimes they may be intruders and leak info to extruders for further attack to be taken place in by using his/her credential extruders enters to the system and make theri work and clear logs and vanish.

d. How can you tell the difference between the two types of potential compromises?

Theft of FTP Passwords: This is another very common way to tamper with web sites. FTP password hacking takes advantage of the fact that many webmasters store their website login information on their poorly protected PCs.

The thief searches the victim’s system for FTP login details, and then relays them to his own remote computer. He then logs into the web site via the remote computer and modifies the web pages as he or she pleases.

Viruses are computer programs that attach themselves to or infect a system or files, and have a tendency to circulate to other computers on a network.

They disrupt the computer operation and affect the data stored – either by modifying it or by deleting it altogether. “Worms” unlike viruses don’t need a host to cling on to. They merely replicate until they eat up all available memory in the system.

The term “worm” is sometimes used to mean selfreplicating “malware” (MALicious softWARE). These terms are often used interchangeably in the context of the hybrid viruses/worms that dominate

Add a comment
Know the answer?
Add Answer to:
As the network security administer, you are concerned the wireless network has been compromised even though...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. As a Network and Security Administrator, you are asked to monitor employee activity during the...

    1. As a Network and Security Administrator, you are asked to monitor employee activity during the day. Your AUP policy does not permit the use of outside devices. You noticed a rogue device on your network. What procedures do you follow to eliminate and prevent future usage of this device on your network? What happens to the owner of the device, who is NOT employed at your company? 2. You as a small business owner have chosen NOT to comply...

  • Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set...

    Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up. You have been hired to secure the RMC network and ensure that the...

  • The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of...

    The opening case, ‘Hackers Attack the SWIFT Global Banking Network’, discusses breaches in the system of several banks that are a part of the SWIFT network. The case is an example of the importance of information system controls. Explain some of the security risks associated with information systems as well as some security and control measures that can be implemented to protect against these security risks. Hackers Attack the SWIFT Global Banking Network SWIFT, which stands for Society for Worldwide...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • is placed at the 16. When you prepare to administer place the patient in the position...

    is placed at the 16. When you prepare to administer place the patient in the position pero The 17. The Th po The O when the skin tumed to the side T8 The Part the sides Choos apply 13. Theodor distress, allowing Fill in the blank with the correct Key Terms Bateral aspect of the high to prevent and loving in and out of the described as lying on the stomach w described as lying on the back with 21....

  • Plz answer 27 to 40 flooding the network with 27. Which of the following is a...

    Plz answer 27 to 40 flooding the network with 27. Which of the following is a type of denial-of-service attack that involves broadcast messages that contain a spoofed source address of an intended victim? a. packet storm b. broadcast flood c. smurf attack d. half-open SYN attack 28. When would you most likely NOT choose to use a leased line connection? a. when high-quality, 24/7 access is needed b. for mission critical applications c. when fast upstream as well as...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Please help to answer these questions HIPAA Assessment 1. When you comply with HIPAA standards, what...

    Please help to answer these questions HIPAA Assessment 1. When you comply with HIPAA standards, what are you ensuring? a. Patients have unlimited access and control over their health information. b. Patients have legal rights regarding who can access and use their PHI. c. Our organization has implemented the proper security controls required by law. d. Our organization has the final say on who can access our patients and/or customers’ PHI. 2. You attempt to log in to an unattended...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT