The worksheet is a guide you should use to assure that all work for the week is completed properly. You should complete the assignment worksheet, then, post the worksheet in the proper B b weekly folder.
Please label all submitted files using the format: [first initial & last name]-[COT410WSx]. Example: nstudent-COT410WS4
Unit time: 165 minutes
Read pages 6-1 through 6-34
Complete B-1: Comparing wireless networking standards, complete questions 1-8 on page 6-17 and
6-18. (24 points)
Item Answer
1. WiFi, Bluetooth, Infrared, 802.11a, WiMax
2. Wifi
3. 802.1x
4. 10M
5. No
6. Speed, distance, freq, cost, security
7.
Yes, the computers could be networked together or the Scanners could be connected to the WiFi network
pages 6-31through 6-33 (32 points)
1. B
2. B
3. C
4. C
5. A
6. INFORMAL
7. A,B,D
8. C
9. TRUE
10. B
11. B
12. CHALKING
13. D
14. SSID
15. TRUE
16. FALSE
February 10, 2011 1 | P a g e
Unit time: 135
Read pages 7-1 through 7-44
Complete A-1: Identifying common security threats, complete questions 1-8 on page 7-6 and 7-7
(16 points)
Item Answer
1. D
2. A
3. A
4. TRUE
5. D
6.
TROJAN- DELIVERY VEHICLE FOR CODE
LB- RUNS WHEN A CONDITION IS MET
7. NO
8.
COULD BE MALICIOUS (DDOS) OR COULD BE PART A TEAM TO COMPLETE A DISTRIBUTED
COMPUTING TASK
Complete A-2: Discussing social engineering, complete questions 1-3 on page 7-11. (6 points)
Item Answer
1. A,B
2.
3.
TRAINING
EAVESDROPPING, FINGER WATCHING
Complete A-3: Discussing DoS attacks, complete questions 1 and 2 on page 7-14. (4 points)
Item Answer
1.
2.
FLOODS SERVER WITH HALF OPEN TCP CONNECTION
AUTOMATICALLY DROP ICMP TRAFFIC FROM OUTSIDE THE NETWORK
Complete B-1: Creating a security policy, complete questions 1-8 on page 7-27. (16 points)
Item Answer
1. TO PROTECT THE ORGANIZATIONS INFORMATION AND LIMIT LIABILITIES AND LEGAL ACTIONS
2. TO ENSURE A SINGLE PERSON ISN’T IRREPLACEABLE
3. TO PRETECT THE ORGANIZATION FROM A MAJOR SECURITY INCIDENT
4. E
5. LENGTH TO SET AUTO EXPIRATION
6. SPECIFIES SERVICE LEVELS FOR SUPPORT AND PENALTIES FOR SERVICES NOT BEING MET
7. OPERATIONS SECURITY
8. PERSONALLY IDENTIFIABLE INFORMATION
February 10, 2011 2 | P a g e
Complete B-2: Creating a human resources policy, complete questions 1-6 on page 7-30. (12 points)
Item Answer
1. TO EVALUATE POTENTIAL SECURITY RISKS
2. KEEP EMPLOYEES FRESH
3. HELP ALLEVIATE ABUSE OF POWER
4. HELP PREVENT MISTAKES
5. EXIT INTERVIEW, ACCESS REMOVED, ESCORTED EXIT
6. EMPHASIZES RESPONSIBILITY, ACT LEGALLY, AND HONESTY
Complete B-3: Creating an incident response and reporting policy, complete questions 1-5 on page 7-34.
(10 points)
Item Answer
1.
AVAILABLE RESOURCES
IDENTIFY STEPS TO BE TAKEN
ACCEPTABLE RISKS DOCUMENTED
DUE DILIGENCE
CONTAINMENT, BECAUSE ERADICATION WON’T WORK UNLESS THE THREAT IS CONTAINED
2.
FIRST.
DISCONNECT FROM NETWORK, SYSTEM SHUT DOWN, FIREWALL HARDENED, LOG ON
3.
ACCOUNTS DISABLED, FILE TRANSFERS SUSPENDED
4. SYSTEM RESTORE AND PASSWORD RESETS
5. JUSTIFY THE EXPENSES AND USED FOR TRAINING OR LEGAL PURPOSES
Complete B-5: Identifying the need for user education and training, complete questions 1-4 on page 7-40. (8 points)
Item Answer
1. VERY, TO PREVENT ACCIDENTAL LOSS OF DATA
2. ENABLES ALL USERS TO BE A PART OF THE SECURITY TEAM
3.
4.
REASON FOR TRAINING, SECURITY CONTACTS, WHO TO CONTACT, ACTIONS TO TAKE, POLICIES,
APPROVED TECHNIQUES, SYSTEM ACCOUNT SECURITY
LOGON BANNERS, SYSTEM ACCESS FORMS, DEPARTMENTAL BULLETINS
Complete B-6: Identifying education opportunities and methods, complete questions 1-3 on page 7-42.
(6 points)
Item Answer
OJT- HANDS ON
1. CLASS-SHARE PERSONAL EXPERIENCES
2.
3.
ONLINE-CENTRALIZED STORAGE AND TEACHING AND TIME CONVENIENCE
OJT-NEED PRIOR TRAINING
CLASS-SCHEDULES
ONLINE-LACK OF PERSONAL INTERACTION
OJT-BECAUSE IT’S EQUIPMENT BASED
February 10, 2011 3 | P a g e
pages 7-43 through 7-44 (34 points)
1. DOS
2. SYN FLOOD
3. ICMP
4. ZOMBIES
5. DOS, WEB SPOOFING, INFO THEFT, TCP
SESSION HIJACKING, DATA CORRUPTION
6. ACCEPTABLE USE
7. DUE CARE
8. NEED
9. DELETING FILES OR REFORMATTING
DISKS DOESN’T FULLY ERADICATE THE
DATA STORED
10. REQUESTS THAT ALL PERSONNEL
ARE HONEST, TRUSTWORTHY, ACT
LEGALLY, AND RESPONSIBLE.
APPLICABLE TO USE OF COMPANY
DATA
11. INCIDENT RESPONSE
12. CHANGE MANAGEMENT
13. TRUE
14. PHONE DIRECTORIES, ORG CHARTS,
MANUALS, CALENDARS, HARDWARE
15. TROJAN
16. NEGLECT, LACK OF TRAINING,
COMPLACENCY
17. DELETING FILES OR REFORMATTING
DISKS DOESN’T FULLY ERADICATE
THE DATA STORED
Complete the following LabSim Resources and Labs.
6.0 Wireless Networking
6.1 Wireless Concepts
6.1.1 Radio Frequency Wireless
6.1.2 Wireless Architecture
6.1.3 Wireless Architecture Facts
6.1.4 Wireless Infrastructure Facts
6.1.5 Exam Questions
6.2 Wireless Standards
– Section 6.1 (1 point)
6.2.1 802.11 Wireless Standards
6.2.2 Wireless Standards Facts
6.2.3 Infrared and Bluetooth
6.2.4 Infrared and Bluetooth Facts
6.2.5 Exam Questions - Section 6.2 (10 points)
6.3 Wireless Security
6.3.1 Wireless Security
6.3.2 Wireless Security Facts
6.3.3 Wireless Attacks
6.3.4 Wireless Attack Facts
6.3.5 Exam Questions - Section 6.3 (9 points)
6.4 Wireless Configuration
6.4.1 Wireless Network Configuration
6.4.2 Wireless Configuration Tasks
6.4.3 Configuring Wireless Networks
6.4.4 Create a Wireless Network (6 points)
February 10, 2011 4 | P a g e
6.4.5 Secure a Wireless Network (3 points)
6.4.6 Select a Wireless Adapter (3 points)
6.4.7 Configure Wireless Profiles (7 points)
6.4.8 Exam Questions - Section 6.4 (8 points)
7.0 Wide Area Networks (WANs)
7.1 Wide Area Networks (WANs)
7.1.1 WAN Technologies
7.1.2 WAN Structures
7.1.3 WAN Services
7.1.4 WAN Media Facts
7.1.5 WAN Facts
7.1.6 WAN Services Facts
7.1.7 Exam Questions – Section 7.1 (17 points)
7.2 Internet Connectivity
7.2.1 Traditional Internet Connectivity
7.2.2 Mobile Internet Connectivity
7.2.3 Fiber and Power Line Internet Connectivity
7.2.4 Internet Services Facts
7.2.5 Connect to a DSL Network (7 points)
7.2.6 Exam Questions - Section 7.2 (13 points)
8.0 Network Security
8.1 Network Threats
8.1.1 Network Threats
8.1.2 Social Engineering
8.1.3 Network Threat Facts
8.1.4 Countermeasures Facts
8.1.5 Exam Questions – Section 8.1 (18points)
Case Project 1
You are working on assignments for two customers: Thomas Jefferson Community College in Virginia and the Tasty Pelican restaurant in Montréal. For the community college, you help them to design a wireless network for the financial resources team members in the administration building and you help them determine how to connect the administration building to the student services building. For the
Tasty Pelican restaurant, you help design a small private wireless network for their restaurant and a public network for their adjoining coffee shop.
Question 1-1: Designing a Wireless Network for Roaming Team Members
Thomas Jefferson Community College uses a team approach for managing the financial resources of the college. The team members primarily work in the administration building which houses the president’s office, human resources, payroll, accounting, development, and the main IT office. Each area uses teams and team members who are often mobile, going between work areas. For example, the payroll supervisor is on both the payroll team and the human resources team. She also often attends meetings in the accounting area and serves as a backup accounting supervisor. In another example, the IT
February 10, 2011 5 | P a g e
manager of applications development spends equal amounts of time in the president’s, human resources, payroll, accounting, development, and IT areas. Currently it is difficult for any team member to access networked computer resources when they are not in their office. How might you design a wireless networking alternative for this environment? (10 points)
Answer: I would incorporate Wireless Access Points as point-to-multipoint LANs throughout the campus utilizing the already present wired network. The WAP’s would be in the multiple areas that they would work to ensure a strong signal and fast speeds
Question 1-2: Connecting the Administration Building to Student Services
The network in the Thomas Jefferson Community College administration building is connected to the network in the student services building only via five old dial-up modem connections in an access server because a river separates the buildings. DSL and cable modem options are not available in this area.
What wireless alternatives exist for the college to link these buildings? Which of the alternatives do you recommend?
(10 points)
Answer: There is outdoor point-to-point, or outdoor point-to-multipoint options that could be utilized. If they just want to connect the two buildings then the point-to-point option with directional high gain antennas between buildings would work. If they wanted to connect more than one building then the point-to-multipoint option may be a better fit.
Question 1-3: Wireless Options for a Restaurant and Coffee Shop
The Tasty Pelican is an upscale restaurant in Montréal that services up to 55 customers per evening. The management of the Tasty Pelican wants to speed the processing of food orders by equipping its waitpersons with handheld devices. Also, the Tasty Pelican has an adjoining coffee shop and they want to offer public wireless Internet access in the coffee shop. What wireless options do you recommend for the restaurant and the coffee shop? (10 points)
Answer: I would recommend the Mobile MICROS system located here: http://www.micros.com/Solutions/ProductsAM/MobileMICROS/
This company specializes in exactly what they are looking for. The waitpersons could take their orders at the tables and they would automatically be sent to the kitchen without having to go to a kiosk. To offer public wireless internet access, I would recommend they get an additional DSL line just for the public internet access and keep it separated from whatever internet connection the restaurant already has. Then ensure the connection is secure with a firewall and only offer theWiFi password to customers.
Question 1-4:
What security measures are available for wireless solutions that might be applied to the Thomas
Jefferson Community College and the Tasty Pelican designs? (10 points)
Answer: Regarding the campus, there should be some sort of authentication for the wireless users.
That would mean incorporating a RADIUS server and RADIUS Client software or they could just use a username/password for access. The restaurant’s setup of mobile POS devices could be secured by only allowing as many ip addresses access to the network as there are devices. They could even statically assign them to further secure the network. And for the public internet café, as stated before, I would
February 10, 2011 6 | P a g e
recommend an additional DSL line setup just for the public access and just use a wireless router to
share the connection.
____ Participate in DQ 4.1 and DQ 4.2
____ Complete Unit 6 Quiz
____ Complete Unit 7 Quiz
February 10, 2011 7 | P a g e