Assignment on grading rubric

Assignment Help Marketing Management
Reference no: EM13778378

 Discuss wireless technology including wireless protocols, wireless devices, and wireless security.

 Explain various types of wireless attacks and methods to mitigate these attacks.

 Examine appropriate control mechanisms to secure data in virtualized environments and on the cloud.

Course outcome:

IT286-3: Explain the protection of wireless networks and cloud services, and the hardening of hosts and
applications.
Instructions:
NOTE: You will have two parts to the Assignment in this unit that will be submitted as one file through the
Dropbox.
Requirements:
Unit Assignments include short essay, descriptive tables and screen captures demonstrating an understanding of the topics. Any resource used including the textbook should be properly cited.Documents should be submitted using APA Style (double-spaced with a title page and a reference page).Essays should be separated into sections by the Assignment Part number and the question number.

Part 1

1. Create a table comparing WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and WPA2

Standard Definition Algorithm Suggested Use

2. In a short essay, describe Temporal Key Integrity Protocol (TKIP). What is it based on? What does it do?

3. You are asked to secure a wireless network by making sure only authorized computers connect. What can

you do to accomplish this? Give an example.

4. Review Table 5.1 in your text that lists six different types of wireless attacks and matches an analogy of

each attack. Do some research on these attacks and create a table of your findings.

Attack Name Definition Result

5. In a short essay, define the three cloud computing service models.

6. In a short essay, examine the cloud computing delivery models. Give a scenario for each.

7. The following five topics describe important concepts for virtualizations: Snapshots, Patch Compatibility,

Host Availability/Elasticity, Security Control Testing (SCT) and Sandboxing. Briefly define each of these and

explain why it can be a security concern.

 

Part 2

1. Connect a wireless network on a Windows system

View the video on wireless connections before doing this lab.

To set up a new wireless connection, select Set up a new network from the Network and Sharing Center
window.

To enable an automatic wireless network configuration, select the wizard.

To manually connect to a wireless network, select the Manually create a network profile.

To connect to an existing wireless network under Available networks, select the network name and then
Configure. In Wireless Network Properties, specify the wireless network settings and specify the networkname SSID (Service Set Identifier). Using only the SSID is not secure. Take a screen capture of the settings.

2. Wireless Capture Tools

Note: Be cautious when downloading any software tool from insecure websites.

Review a wireless packet sniffer tool (see suggestions below) and provide a brief description. Take a screen
capture of the output data from the tool as shown on the wireless packet sniffer website (if not available, showfeatures).
Suggestions:

Aircrack-ng - a set of tools for auditing wireless networks

NetStumbler - wardriving to find open wireless access points

InSSIDer - signal strength and access point finder, etc.3. Platform as a Service
Review a Platform as a Service (PaaS) vendor (Ex: Salesforce.com or Amazon Web Services) and describe
how the client interacts with the cloud using this service. Outline several of the features of the platform and take a screen capture of the vendor's marketing site and graphics. Review the grading rubric below before beginning this activity:

Reference no: EM13778378

Questions Cloud

What does movie quiz show tell us about cheating : What does movie Quiz Show tell us about cheating? Analyze the moral issues raised in this movie from the perspective of Aristotle's virtue ethics, utilitarianism, and/or Kantianism.
The nature versus nurture debate issues : Are effective leaders born or made? Why do you believe so? Use a specific example to back up your opinion.
Grading the xml file along with the http get query : Using Google Maps create an rssGEO2.0.xml document that will group and display at least five different geographical locations. The theme of the locations is up to you, but include your favorite vacation destinations, restaurants, nightclubs, or pl..
Different types of determinism : Define and evaluate two different types of determinism and explain why you do or do not agree with these theories.
Assignment on grading rubric : Discuss wireless technology including wireless protocols, wireless devices, and wireless security.Explain various types of wireless attacks and methods to mitigate these attacks. Examine appropriate control mechanisms to secure data in virtualized en..
Social responsibility-forecasting for decision making : Identify four key areas you need to forecast? Why did you select those four areas? What forecasting techniques will provide you with the appropriate information you will need in making decisions?
Emotional intelligence rating issues : Why do values affect leadership?
Two pieces of scaffolding : Using the keyword definition, write 1 exam question and provide two pieces of scaffolding that explain how you would go answering your question.
Write a essay about technology and education : Write a essay about Technology and Education.

Reviews

Write a Review

Marketing Management Questions & Answers

  What are the ethical implications of this draft

The insurance company where you work is planning to raise all premiums for health-care coverage. What are the ethical implications of this draft

  Explain the solution to strategic management questions

Explain The solution to strategic management questions and Discuss some of the requirements for successful strategic change

  Explain quantitative measures to monitor marketing

Explain Quantitative Measures to monitor marketing effectiveness and describe marketing mix and Does it meet the needs of the target customers

  Briefly describe google its mission and its business model

Google is widely known for its workplace creativity and innovation within the technology field. Briefly describe Google, its mission, and its business model

  Find a recent example of publicity for a global company

1. how does public relations differ from advertising?2. find a recent example of publicity for a global company.

  Explain analyze the supply chain of home depot and lowe''s

Explain Analyze the Supply Chain of Home Depot and Lowe's and Explain how the supply chain was modified form brick to mortar by e-commerce

  Describe in brief the histories of both of amazoncom and

write a six to eight 6-8 page paper in which youdescribe in brief the histories of both of amazon.com and yahoo.com and

  Does marketing convince consumers to create new desires

does marketing convince consumers to develop new desires about products and services they do not need or does it just

  When a company grows globally by introducing existing

1 big fizz co. a manufacturer of cola-flavored drinks wants to add packaged fruit juices to its existing product line.

  Explian background mission statment

CREATE A COMPANY AND EXPLAIN THE: Background mission statment, Business model, Value proposition

  Calculate the mean median mode and variance

Calculate the mean, median, mode, variance, and standard deviation for the numeric data. Construct a histogram, pie, or Stem-Leaf Display chart encompassing the mean leadership scores for both male and female managers

  Is it easier for businesses to lie to customers online

Corporate blogs, also known as business blogs, have opened the line of communication between businesses and customers. Is it easier for businesses to lie to customers online

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd