Sec435 Week 5 Discussion 1 - Wireless Penetration

In: Computers and Technology

Submitted By sabedulce77
Words 491
Pages 2
Week 5 Discussion 1
"Wireless Penetration" Please respond to the following:

Describe in detail the steps involved in cracking WEP encryption. Discuss the implications of relying on such a legacy protocol today and how essential it is for the IT industry to keep current with technology.

Explain how to conduct a man-in-the-middle attack between a client (user’s computer) and their access point (AP). Discuss two trust issues which revolve around any type of wireless (i.e. Wi-Fi, WLAN, 3G, Bluetooth) communication.

Wep is the basic security encryption mechanism. WEP is weakened by the use of a 24 bit initialization vector (IV) that is reused in a short period of time, thus rendering WEP vulnerable to attack by several readily available cracking tools. One of the challenges of wireless traffic analysis is the ability to inspect the contents of encrypted data frames. Now wireshark has the ability to decode many different network layer and higher protocols, encrypted traffic limits the ability to analyze packets and troubleshoot network problems. Wireshark offers some options to analyze WEP encrypted data. Wireshark offers some options to analyze WEP encrypted data. When configured with the correct WEP key, Wireshark can automatically decrypt WEP encrypted data. When and dissect the plaintext contents of these frames. This allows the administrator to use display filters, coloring rules and other Wireshark features on the decrypted frame contents.

In this day in age WEP is not considered a very good security encryption mechanism. I see the WEP as secure as a house front door. It does the job for keeping out any Joe from just walking in the house. However, it is vulnerable to hackers. It would be cake walk for a hacker to break in.

Technology continues to move rapidly when changes are made in the IT industry. It is vital for the IT industry to stay up with…...

Similar Documents

Re: Week 5 Discussion 1

...The ground breaking technological advancements of today is allowing the average consumer to watch streaming videos; the technologies have come to the front from companies such as Ericsson and Alcatel-Lucent. These technologies will continue to amaze and amuse us like rides at an amusement park. Compare and Contrast 3G Wireless Networks to 4G Networks The comparisons and contrasts are laid out on blueprint papers and networks architectural layers in terms of services and applications, data throughput, and the end users perceptions. The differences in network architectural layout has its contrasts between the 3G and 4G networks, 3G networks are compiled of 1xrtt networks, CDMA 2000, along with the edge network. This observation comparison of the 4G network contrasts itself above the 3G network by increased data speeds, based on the network architectural cable wiring of the 3G network, and the fiber optic glass like tubes of a 4G network carrying thousands more data packets a second. The 4G networks, LTE, and LTE-advanced, WiMax2, advance themselves beyond the 3G networks, it’s like comparing and contrasting dial up speeds to high internet speeds at this point. The services and applications entertainment would start with3G attractions, mobile applications, streaming video and data applications became main-stream. (Smartphone 3G and 4G technology, heading paragraph: 4G: Up to 1Gbps.) With this 3G attraction there were mobile applications, and video content that required......

Words: 1518 - Pages: 7

Re: Week 5 Discussion 1

...|NW490 – Senior Seminar | |Vanesa Weeks | |James Hawkins | |Justin Ossai | | | |10/6/2009 | | | Company Overview The purpose of this proposal is to implement wireless communication at Westwood Resort, address the current network status and how to improve network capabilities throughout the resort. The goal of the company is to provide free Wi-Fi access to guests and at the same time ensure that the internal network remain secure. In addition, the resort wants to provide better cell phone access in the Fitness Center. Westwood Resort is located in Atlanta GA; it is a single building structure which is composed of ten stories, 500 guest rooms, two banquet halls, seven meeting rooms, hotel lobby, reception, coffee shop, fitness center, and poolside. The Business Center and half the guest rooms are wired for internet access with a dedicated T-1 connection. The hotel currently runs an Ethernet network at 10Mbps with Linux as their......

Words: 2827 - Pages: 12

Bus642 Week 5 Discussion 1

...the next 5 years. My goal for the survey is to see if I can meet the requirement to become a Senior Financial Analyst. Becoming a Senior Financial Analyst make me happy? I sent an email survey to 17 senior financial analysts within my current company. The data collected will confirm if I should continue seeking the position of a Senior Financial Analyst. Seventeen Senior Financial Analysts were given an e-mailed survey to complete which will show what is required for a Senior Financial Analyst position. The questions that were asked are as follows: 1. What is the highest educational requirement needed for a Senior Financial Analyst? A) Bachelors; B) Masters, C) Doctorate, or D) Certificate/License 2. How many years of experience are needed to become a Senior Financial Analyst? A) Less than 5 years; B) 5 years; or C) more than 5 years 3. How many hours do you work each week as a Senior Financial Analyst? A) Less than 40 hours per week, B) 40 hours per week; or C) More than 40 hours per week. 4. Due to the level of responsibilities for a Senior Financial Analyst, are you happy with your annual compensation? A) Yes or B) No 5. Are you satisfied being a Senior Financial Analyst? A) Yes, o B) No Out of the 17 emailed surveys, I received responses from 13. The results to the questions are below in Table 1: Table 1 Highest Level of Edu Bachelor Masters Doctorate Certificate/License 3 8 2 0 Years of Experience Less than 5 years 5 years More than 5......

Words: 949 - Pages: 4

Sec 435 Week 1 Discussion Sec435 Week 1 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found......

Words: 3013 - Pages: 13

Sec 435 Week 3 Discussion Sec435 Week 3 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found......

Words: 3013 - Pages: 13

Sec 435 Week 5 Discussion Sec435 Week 5 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found......

Words: 3013 - Pages: 13

Sec 435 Week 7 Discussion Sec435 Week 7 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies......

Words: 3013 - Pages: 13

Sec 435 Week 8 Discussion Sec435 Week 8 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found......

Words: 3013 - Pages: 13

Sec 435 Week 1 Discussion Sec435 Week 1 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies......

Words: 3012 - Pages: 13

Sec 435 Week 2 Discussion Sec435 Week 2 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found......

Words: 3013 - Pages: 13

Sec 435 Week 3 Discussion Sec435 Week 3 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found......

Words: 3013 - Pages: 13

Sec 435 Week 5 Discussion Sec435 Week 5 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found......

Words: 3013 - Pages: 13

Sec 435 Week 8 Discussion Sec435 Week 8 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found......

Words: 3013 - Pages: 13

Sec 435 Week 10 Discussion Sec435 Week 10 Discussion

...SEC 435 Complete Course Week 1 to Week 11 Download Answer here http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 1 Discussion "Security Analysis  and Protocol Analysis"  Please respond to the following: * Discuss three (3) security concerns of corporations in the U.S. Next, analyze the overall manner in which you would use security analysis to identify levels of concern and propose one (1) strategy to mitigate the concerns in question. Provide a rationale to support your response.  * Specify one (1) way in which you would use Three-Way Handshake to build a TCP connection between two (2) computers. Next, analyze the roles in which the various fields of the “TCP header” play in building and maintaining the connection. Include one (1) example of such role to support your response.  * http://workbank247.com/q/sec-435-complete-course-week-1-to-week-11/12288 SEC 435 Week 2 Discussion "DMZ  and Logs"  Please respond to the following: * Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.  * It is commonly known that logs have become increasingly important in the IT industry--so much so that several security companies have found......

Words: 3013 - Pages: 13

Week 5 Discussion 1

...network from the perspective of the neighbors - Slow to converge - Susceptible to routing loops - Easy to configure administer - Consumes a lot of bandwidth Protocol of Routing Open Shortest Path First or OSPF behaves to the type of link state routing protocols. In this protocol all routers of network use a single database. A database describes, as well as what networks every router is related to. OSPF uses path cost as its basic routing metric. Basic routing metric allows taking into account the real carrying capacity using more effective routes. Descriptions: - синхронизация базы данных связей через 1 выделенный маршрутизатор - отсутствие ограничений на длину маршрута - периодический обмен только короткими сообщениями о связях маршрутизатора - при изменении связи уведомление посылается незамедлительно - synchronization of base of these connections through a 1 distinguished router - absence of limits on length of route - periodic exchange only by short reports about connections of router - at the change of connection notification is sent immediately For new LAN architecture I choose RIPv.2, because this network is small that and routing will be used primitive. Simplicity of development and tuning will be my choice at the construction of this network....

Words: 382 - Pages: 2

1000names Meee-Loooo-Deee | Reproducir | Chap 318