Why and how would you suggest testing security

Assignment Help Computer Network Security
Reference no: EM131131974

Disscussion reply to the question asked from students minimum words count 50 each

1: Security testing is performed in order to find flaws in security and also finding vulnerabilities and weaknesses in software applications. As we have learned from security breaches of systems at retailers like Target and Home Depot, we see the importance of ensuring that security testing efforts are up to date. I believe the main objective of security testing is to find out how vulnerable a system is and to determine whether its data and resources are protected from potential intruders. With online transactions increasing security testing is one of the most critical areas of testing all web applications

2:. Why and how would you suggest, testing security?

3: How do you recommend protecting your environment from malicious software?

4: Please describe issues related to wireless security?

5: George, good post and good point, "there are many security issues when it comes to wireless" and I like your advice about how "network administrators must be aware of these risks, and stay up-to-date on any new risks which might be out there," great points.

Throughput - poor power connection and limited connection.

Bottlenecking - high volume of traffic, happens during certain times of the day. An example would be apartments, hotels, and anywhere wireless connections are shared.

Hacking - wireless system is not secure.

George and class, how important are passwords? And how often should they be changed.

6:I agree on your definition of security testing. Security testing is important in making sure everything is working properly and up to date with the latest protection. There has been large organizations that have been victim to hackers like you mention. Recently I heard that Wendy's had a breach of people's credit cards and personal information being out. I believe having security testing more often for these large organizations would at times prevent things like this from happening. It's scary knowing that you can buy something as simple as a shake and loose thousands of dollars from your credit card information being stolen.

Reference no: EM131131974

Questions Cloud

Assuming the shares are held in the treasury : Kwun, Inc. purchases 1,000 shares of its own previously issued $5 par common stock for $12,000. Assuming the shares are held in the treasury, what effect does this transaction have on
Write a sample portion of an emergency plan : write a sample portion of an emergency plan for that section for your hometown or another municipality of your choice.
Do you agree or disagree : You have just been told, “Because we are going to finance this project with debt, its required rate of return must exceed the cost of debt.” Do you agree or disagree? Explain.
For what reasons might a company like ibm repurchase some : For what reasons might a company like IBM repurchase some of its stock (treasury stock)?
Why and how would you suggest testing security : Why and how would you suggest, testing security? How do you recommend protecting your environment from malicious software?
Which external factor has greatest impact on social class : In evaluating the U.S. Census projection data, determine which external factor has the greatest impact on social class. Predict two ways that social class will affect consumer behavior in the next 10 years.
Why is the cost of capital measured on an after tax basis : Why is the cost of capital measured on an after-tax basis? Why is use of a weighted average cost of capital rather than the cost of the specific source of funds recommended?
The market price of the shares at the time of the exchange : Land appraised at $80,000 is purchased by issuing 1,000 shares of $20 par value common stock.
Explain competitive analysis of organization and offering : Explain a competitive analysis of the organization and offering. Describe your target market in detail, including information on the geographic, demographic, psychographic and behavioral factors used to choose your market segment.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Post your thoughts on perception vs reality of cyber threat

Read the article "Cyber Security Risk: Perception vs. Reality in Corporate America". After reading the article, please post your thoughts on the perception vs. reality of a cyber threat against a SCADA system.

  Strategy for dealing with the risk

For each malicious attack and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)

  Network infrastructure and security

Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

  Security administrator of a major organization

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer

  What a great definition of cryptography

Timothy, what a great definition, cryptography is the science of decoding information with a key and like Timothy stated, these keys are both "public (lock) and private (unlock)."

  Incremental evaluation of a system

TCB subsets are said to leverage purely hierarchical domains ordered by privilege and explain the relation between these domains and protection rings.

  Make an incident-response policy that covers the

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

  Discuss the requirements for remote administration

Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here.

  Assignment on 4g wireless networks

The 3rd Generation Partnership Project (3GPP) developed the 3GPP LongTerm Evolution (LTE) standard for wireless communications technology.

  Seven phases of the systems development life cycle

iscuss and explain each of the seven phases of the systems development life cycle. Make sure your descriptions make connections between the different phases

  Different logon passwords to be five upper-case letters

Computer system 1 needs logon passwords to be five upper-case letters. How many different passwords are there for system 1?

  Help us understand how to stop spreading

The online service should be easy to use, give us good information about any IP's the malware references, and help us understand how to stop spreading.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd