Write response on the security

Assignment Help Computer Engineering
Reference no: EM132240595

Question: Provide a 50-75 word discussion reply to the following post below.

Setting up the proper security for a wireless network at a business can be difficult to do for multiple reasons. There are a few major things to consider when doing so to allow for the most optimal performance as well as security. One of the more important things to keep in mind is to use Enterprise WPA2. Doing this will allow an easy way to revoke an employee's user log-ins. Another important measure to take, which may sound ridiculous, is to have the proper physical security in place. This means locking the wiring closets and any equipment that is at risk to be tampered with. The last considerations I will touch on, among many, is to keep the software and any equipment up to date. This can mean performing regular updates, or routine upgrades of equipment.

Security breaches are not an uncommon occurrence nowadays. A pretty common breach that happened in February of 2018 was a breach of Under Armour's MyFitnessPal app which compromised many usernames, email addresses, and passwords. The intrusion was realized by Under Armour until March 25 of the same year. It then came out that Under Armour had used a hashing scheme called SHA-1 which had known flaws. Under Armour obviously stopped using SHA-1 to hash passwords and went to using bcrypt. This was a reminder for many people that corporate networks do not always use the best options out there.

References: Newman, L. H. (2018, July 11). The Worst Cybersecurity Breaches of 2018 So Far.

Parsons, Shaffer, Carey, Parsons, Oja, & Finnegan. (2015). IT 221: New Perspective on Computer Concepts 2016 Comprehensive + Microsoft Office 2013 Enhanced Edition 1st Course, 1st ed., Mason, Ohio: Cengage Learning.

Reference no: EM132240595

Questions Cloud

Describe some of the ways in which the manager behavior : Describe some of the ways in which the manager's behavior and actions toward in-group and out-group members varied.
Ceo about building a culture of respect and trust : What advice would you give to a company CEO about building a culture of respect and trust?
How would you apply your new knowledge : Consider the content of this class as they relate to information management/IT and managerial decision making. How would you apply your new knowledge?
Characteristics of effective and dysfunctional teams : What are characteristics of effective and dysfunctional teams in management?
Write response on the security : Setting up the proper security for a wireless network at a business can be difficult to do for multiple reasons. There are a few major things to consider.
How will emerging technologies impact the industries : How will emerging technologies impact these industries? Please provide clear examples. What changes will these industries have to make regarding the workforce.
Addie in the management field : Name and describe another model based on ADDIE in the management field?
What are at least two types of change : What are at least two types of change, and how are Lewin's and Kotter's approaches designed to handle change?
What are the principles behind the agile manifesto : Create an 8- to 12-slide Microsoft PowerPoint presentation that summarizes the Agile Manifesto. Present at least two points of praise.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a boolean function name is prime that takes an integer

Write a Boolean function named Is Prime that takes an integer as an argument and returns true if the argument is a prime number or false otherwise.

  Provide two methods on this library for sorting books

Provide two methods on this Library for sorting books after they are read in from the data file.

  Write a program that prints range of a sequence of integers

Write a program that prints the range of a sequence of integers provided through stdin. For example, the range of -3, 15, -8, 29, 17 is 29 - (-8) = 37.

  A program to write the graph information to the screen

The first line of the file contains two integers n and m, which indicates the number of vertices and the number of edges on the graph, respectively.

  Discuss how far you can go implementing rbac functionality

Discuss how far you can go implementing RBAC functionality with the tools at your disposal. Show some of the constructs you would use.

  What are the types of new ethernet equipment

An older network using 10baseT technology needs an upgrade. The network contains a total of 220 workstations and 10 servers and has a network diameter of 300 meters. What type of new Ethernet equipment would you suggest be purchase to modernize th..

  Build classifier for the given data set and write a report

COMP5318 - Machine Learning and Data Mining Assignment. Your task is to determine / build classifier for the given data set and write a report

  Threats against network services

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - the Web; and SMTP (Simple Mail Transport Protocol) and POP (Post Office Protocol) - e-mail and instant messaging.

  Can you reconstruct the tree

Can you reconstruct the tree? If so, give an algorithm for doing so and prove its correctness.

  Calculate the number of days in the month desired

Your project will calculate the number of days in the month given the desired month and year.

  Find your state or location data and security breach

Find your state or location's data and security breach and notification law and explain the following in your presentation: History of the law ABC's.

  Create troubleshooting guide of ping failures

Create a 2- to 3-page troubleshooting guide based on this table of ping failures. For each state combination, list the steps you would take.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd