Physical security control, article writing assignment help

User Generated

puevfgvar15

Writing

Description

1. Network Devices, Topologies, and Network Attacks


After reading/viewing this week's materials, please respond to one or more of the following questions.

  1. Describe the functions of hubs/repeaters, bridges, switches, routers, and gateways. At what layers of the OSI model does each device operate?
  2. Describe the different Wireless standards within the 802.11 family. What is a rogue access point, and what do we have to worry about?
  3. Describe the differences between bus, ring and star topologies. List the various wiring standards that are available for use within these topologies.
  4. From the videos, pick one hacker profiled and describe the types of attacks they used in exploiting vulnerabilities of the networks that they targeted. What opening did they gain access through? How were they detected?

2.Physical Security Controls

After reading/viewing this week's materials, please respond to one or more of the following questions.

  1. Identify the malicious threat sources to physical security and their corresponding countermeasures.
  2. Describe the main components of a CCTV system. What are some of the concerns with CCTV deployments?
  3. Describe three perimeter intrusion detection systems from the physical security domain and give an example of one that you have seen deployed either at work or another location that you are familiar with

    The TCP/IP Model

    After reading/viewing this week's materials, please respond to one or more of the following questions.
    1. Explain the TCP/IP Model. How do the layers map to the OSI Model layers?
    2. The Transport layer provides two service protocols: UDP and TCP. Explain the differences between the two protocols in terms of guaranteed vs. non-guaranteed service and connection-oriented versus connectionless communication.
    3. What is a DoS attack? What is the main target of DOS in terms of Confidentiality, Integrity and Availability? Give an example of a common DoS attack

Unformatted Attachment Preview

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

please find the attached file. i look forward to working with you again. good bye

Running head: PHYSICAL SECURITY CONTROL

Physical Security Control
Name
Institution
Course
Tutor
Date

1

PHYSICAL SECURITY CONTROL

2
Question One

A repeater operates at the physical layer, and its work is to regenerate signal over a
network. It does not amplify the signal. Bridge works in the data link layer. It filters the content
in the signals by reading the MAC address of destination and source. The switch is a bridge with
many ports equipped with a buffer and a design that boosts its performance and efficiency. Its
works in the data link layer (Wu & Chen, 2016). Router is similar to a switch, which routes data
packets based on their IP addresses. It works on the network layer. Gateway is a passage that
connects two different networks. It operates in the network layer.
802.11 specifies over the air interphase between a base station and a wireless client. Their
standards in the family include 802.11a which provides up to 54mps in a 5GHzband. 802.11b
provides up to 11mbps transmission, 802.11e is an enhancement of both a and b. 802.11g applies
to LANs that transmits for distances of 54mps in a 2.4GHz bands. A rogue point is a point of
connection with the servers.
The bus networks link computers independently to a single cable, but the information
delivered to the computers is from the same address. The ring topology is where the computers
are connected using a continuous circular cable. Information travels in one direction. The start
topology is when the computers connect to a single hub using a cable.The local area networks
use T568B. It is also used in small home networks. The T568A is a wiring standard that connects
two computers (Wu & Chen, 2016). The T568B connect the switch or router with the local area
network. The best hacking video is by an anonymous hackers that attacks by cresting a fake
wireless assess points point. Then attacks the computer through the network system.
Question Two

PHYSICAL SECURITY CONTROL

3

The example of threats includes flooding and lightning. They can be protected through physical
security HVAC system, power protection and water and fire protection.
The components that make up the CCTV include cameras, recorders, and monitors. The
monitors display the videos and images to the security personnel. The records include standing
alone NVR and DVR. The DVR stores image sent by the CCTV while the NVR ensures the
images and videos are safe (Wu & Chen, 2016). Cameras are used to capture the images and
videos then send them to the recorder for storage. Some of the concerns are mainly security issue
and monitoring.
Fence alarm, electric fence, and microwave detection. The fence alarm alerts any
possibility of intrusion of a guarded area. Electric fence electrocutes any person that wants to
intrude a secured location. Microwave detectors use rays to detect any intrusion in a given area.
The TCP/IP model is a communication protocol of the Internet. A private network can
use it in their communication network. The top layer is the application layer, then followed by
transport and internet layer. The bottom layer is the network access layer.
The TCP is message validation protocol that uses connection oriented services while the
user datagram protocol uses the connection-less services to send their signal (Wu & Chen, 2016).
DoS is a kind of attack on a netwok that aims to collapse the network by flooding it with useless
traffic. The main target of the Dos is the TCP/IP model. A common attack is the ping of death
that exploits the TCP/IP model.

PHYSICAL SECURITY CONTROL

4

Pdf questions
Question One
When securing distributed computer network you have to make sure the sensitive data is
in a locked room. The ...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags