NOS Threats and Vulnerabilities

  • Read Jack’s Wine and Coffee Shop – A Start-Up Case Study, linked in the Resources under the Required Resources heading.

    Deliverable

    Write 4–6 pages that describe network operating system threats and vulnerabilities that will provide the foundational information to select the appropriate technologies for the case study business.

    • Explain the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting.
    • Describe threats and vulnerabilities specific to operating systems including:
      • Denial of service and distributed DOS/BOTS.
      • Malicious activity detection and forms of attacks.
      • Sniffing, spoofing, and session hijacking.
    • Describe the threats and adversaries that are specific to the use of wireless networks.
    • Describe the components and methods of compromising wireless networks, including the following:
      • MAC spoofing, Web app attacks, and 0-day exploits (National Centers of Academic Excellence in Information Assurance/Cyber Defense, 2013).
      • Backdoors, trojans, viruses, and wireless attacks.
      • Denial of service and distributed DOS/BOTs.
      • Session hijacking and man-in-the-middle attacks.
      • Password guessing and cracking.
      • Packet sniffing.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Use current APA style and formatting guidelines.
    • Length: 4–6 pages, excluding the references page.
    • Font and font size: Times New Roman, 12 point.
Criteria Non-performance Basic Proficient Distinguished
Explain the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting.
Does not explain the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. Explains incompletely or inaccurately the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. Explains the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. Explains the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting, including the use of supporting examples.
Describe threats and vulnerabilities specific to operating systems
Does not describe threats and vulnerabilities specific to operating systems. Describes incompletely or inaccurately threats and vulnerabilities specific to operating systems. Describes threats and vulnerabilities specific to operating systems. Describes threats and vulnerabilities specific to operating systems, including the use of supporting examples.
Describe the threats and adversaries that are specific to the use of wireless networks.
Does not describe the threats and adversaries that are specific to the use of wireless networks. Describes incompletely or inaccurately the threats and adversaries that are specific to the use of wireless networks. Describes the threats and adversaries that are specific to the use of wireless networks. Describes the threats and adversaries that are specific to the use of wireless networks, including the use of supporting examples.
Describe the components and methods of compromising wireless networks.
Does not describe the components and methods of compromising wireless networks. Describes incompletely or inaccurately the components and methods of compromising wireless networks. Describes the components and methods of compromising wireless networks. Describes the components and methods of compromising wireless networks, including the use of supporting examples.
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!

Order Now Just Browsing

All of our assignments are originally produced, unique, and free of plagiarism.

Free Revisions Plagiarism Free 24x7 Support