Comprehensive Security Measures and Technologies for Wireless Networks and Data Storage Systems: Outcome Assessment 3

A solved assessment on security measures for wireless networks and data storage technologies.

Hunter Harris
Contributor
4.1
44
10 months ago
Preview (3 of 9 Pages)
100%
Log in to unlock

Page 1

Comprehensive Security Measures and Technologies for Wireless Networks and Data Storage Systems: Outcome Assessment 3 - Page 1 preview image

Loading page ...

Running Head:Outcome Assessment 31Outcome Assessment 3Student[Pick the date]Discuss varioussecurity measuresandtechnologiesthat are used to protectwirelessnetworksanddata storage systems. In your response, address the following:1.The transition fromWEPtoWPAandWPA2, including theirpros and consand theimprovements made to encryption and security features.2.The concept ofcloud computing, including the different service models such asSaaS,PaaS, andIaaS, and the associatedsecurity concerns.3.The varioustypes of backup methods(On-site, Off-site, and Online) and theirbenefits and risks.4.TheRAID (Redundant Array ofIndependent Disks)technology and its differentlevels, including theadvantagesanddisadvantagesof each.Provide examples to illustrate the use and significance of each technology and describe howthey contribute to network and data security.Word Count Requirement: 800-1000 words.

Page 2

Comprehensive Security Measures and Technologies for Wireless Networks and Data Storage Systems: Outcome Assessment 3 - Page 2 preview image

Loading page ...

Page 3

Comprehensive Security Measures and Technologies for Wireless Networks and Data Storage Systems: Outcome Assessment 3 - Page 3 preview image

Loading page ...

Outcome Assessment 321 (A)Substitutionfor TKIP is a WPA because TKIP is the encryptionwayappliedinWi-Fi ProtectedAccess, and alsowhichchanged WEP in WLANgoods(B)802.11i which is 802.11modelsis thebasisfor WPA2 as outlinedwiththe Wi-Figroupingfor the reason thatWPA (sometimesdemoted to as theoutlineIEEE 802.11ipattern) becameobtainablein 2003.And also theWi-Figroupingplannedit as anintermediarycalculatein anticipation of theease of useof theextrasecureas well asdifficultWPA2. WPA2 becameobtainablein 2004as well asisordinaryshorthand for thecompleteIEEE 802.11i.(c)Cloud computing canengagetheemployof sharedframework.Elasticityis acharacteristicof cloud computing thatanimatedlyprovisionsand alsoreleasespossessions.For the reason thatincloud computing,mainly theelasticity isclassifiedas thelevelto whichaarrangement(or aexactingcloud layer)originallyadapts itsabilityto workloadin excess ofinstance(d)DLP ischecks the contents ofterminals, serversas well asnetworks toconfirmkeysubstanceis not deletedand alsoremoved. Theytoocheckwho is usinginformationlooking forillegalaccessas well astransforming theinformation(e)In thefreezinga DNS server foot printing is aworrybecauseFoot printingis themethodwithwhich DNS zoneinformationis obtainedthroughan attacker togivethe attackeramongthe DNS domain names,as well as alsocomputer names,along withIP addresses forresponsivenetworkpossessions. An attackerusuallystarts an attack byapplying this DNSinformationto diagram,along with alsofootprint, asystem.DNS domainas well asprocessornamesgenerallyspecifythe function orsiteofanareaorprocessorin order toassistuserskeep in mindandrecognizedomainsas well ascomputersadditionalsimply. An attackergets
Preview Mode

This document has 9 pages. Sign in to access the full document!