NOS Threats and Vulnerabilities
- Read Jack’s Wine and Coffee Shop – A Start-Up Case Study, linked in the Resources under the Required Resources heading.
Deliverable
Write 4–6 pages that describe network operating system threats and vulnerabilities that will provide the foundational information to select the appropriate technologies for the case study business.
- Explain the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting.
- Describe threats and vulnerabilities specific to operating systems including:
- Denial of service and distributed DOS/BOTS.
- Malicious activity detection and forms of attacks.
- Sniffing, spoofing, and session hijacking.
- Describe the threats and adversaries that are specific to the use of wireless networks.
- Describe the components and methods of compromising wireless networks, including the following:
- MAC spoofing, Web app attacks, and 0-day exploits (National Centers of Academic Excellence in Information Assurance/Cyber Defense, 2013).
- Backdoors, trojans, viruses, and wireless attacks.
- Denial of service and distributed DOS/BOTs.
- Session hijacking and man-in-the-middle attacks.
- Password guessing and cracking.
- Packet sniffing.
Additional Requirements
- Written communication: Written communication is free of errors that detract from the overall message.
- APA formatting: Use current APA style and formatting guidelines.
- Length: 4–6 pages, excluding the references page.
- Font and font size: Times New Roman, 12 point.
Criteria | Non-performance | Basic | Proficient | Distinguished |
---|---|---|---|---|
Explain the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. |
Does not explain the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. | Explains incompletely or inaccurately the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. | Explains the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. | Explains the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting, including the use of supporting examples. |
Describe threats and vulnerabilities specific to operating systems |
Does not describe threats and vulnerabilities specific to operating systems. | Describes incompletely or inaccurately threats and vulnerabilities specific to operating systems. | Describes threats and vulnerabilities specific to operating systems. | Describes threats and vulnerabilities specific to operating systems, including the use of supporting examples. |
Describe the threats and adversaries that are specific to the use of wireless networks. |
Does not describe the threats and adversaries that are specific to the use of wireless networks. | Describes incompletely or inaccurately the threats and adversaries that are specific to the use of wireless networks. | Describes the threats and adversaries that are specific to the use of wireless networks. | Describes the threats and adversaries that are specific to the use of wireless networks, including the use of supporting examples. |
Describe the components and methods of compromising wireless networks. |
Does not describe the components and methods of compromising wireless networks. | Describes incompletely or inaccurately the components and methods of compromising wireless networks. | Describes the components and methods of compromising wireless networks. | Describes the components and methods of compromising wireless networks, including the use of supporting examples. |