Tuesday, February 18, 2020

Detecting rogue access point using Omnipeek software to analyze the Essay

Detecting rogue access point using Omnipeek software to analyze the wireless network - Essay Example The Open Systems Interconnect reference model formulated by the International Standards Organization (ISO), defines at least seven layers to enable communication through the network. These layers are the physical layer, the data link layer, the network layer, the transport layer the session layer. According to peter and scarfone (2007), the TCP/IP layer provides network communication and is made up of four main layers. These are the 2.0.2 Transport layer: Provides connectionless services and connection oriented services between various elements. It ensures reliability of communication and uses Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).2.0.3 Internet Protocol layer (IP): this layer routes packets across the network. The IPv4 is the fundamental network protocol for TCP/IP layer. Other commonly used protocols are the Internet Group Management Protocol (IGMP) and the Internet Control Message Protocol (ICMP).The four main layers inter-work to transfer informatio n between the hosts. The information is passed from the highest layer to the lowest layer with each layer adding more information. The lowest layer sends the information through the physical network the information is then passed upwards to its destination.Network security encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to protect the network and the resources accessed through that network (Nazario, 2003). Various network security systems are in use. ... Other commonly used protocols are the Internet Group Management Protocol (IGMP) and the Internet Control Message Protocol (ICMP). 2.0.4 Hardware layer; also known as the data link layer and handles communication on the physical network component. The Ethernet is the best known protocol. The four main layers inter-work to transfer information between the hosts. The information is passed from the highest layer to the lowest layer with each layer adding more information. The lowest layer sends the information through the physical network the information is then passed upwards to its destination. Network security encompasses the various provisions made to a computer network infrastructure and the policies adopted by the network system administrator to protect the network and the resources accessed through that network (Nazario, 2003). Various network security systems are in use. The simplest involves one factor authentication through the use of the username and password, two factor authentications by using an ATM card or a mobile phone or three factor authentication using fingerprint or retinal scan. The intrusion prevention systems detect and inhibit any attacks posed by malwares, Trojans and worms (Simmonds et al, 2004). The intrusion detection systems on the other hand detect threats and inform the system administrator. As stated by Crothers (2002), the main methods used to detect the attacks on network systems are; Signature based detection Anomaly based detection State full protocol analysisDifferent network systems have different network security technologies. The different network security technologies can be classified into four major groups. These are; Network based intrusion detection and prevention system (IDPS): monitors

Monday, February 3, 2020

Business Law For Example Coca-Cola Research Paper

Business Law For Example Coca-Cola - Research Paper Example Further, through this report, it is clear that the company has the duty to ensure strict observance of the different laws to reduce the harm that any come as result of non-compliance. Given the sensitive nature of the business that the company (Coca-cola) engages in, it is important to ensure that the company abides by laws intellectual property. Given that Coca-Cola deals with secrets that must be protected. The advantage of this to the company is that they can protect their original ideas so that the inventions and innovations of the company. By listing their innovations and making use intellectual laws that protect their works. The essence of these laws is that they will encourage creativity in the company. Through these sought of these laws ensure that technologies are protected and that individuals who work to bring new ideas are encouraged to bring new innovations. The encouragement makes those involved in the innovation and secrets to enjoying the benefits of their hard earned labor. In this regard, the company should protect intellectual property through copyrights, patents, and trademarks (Edmonds, 2013). Through copyrights, the company is capable of protecting the expressive arts such as the shape of the bottles of soda. That would prevent any other person or organization from using or displaying such materials to the public. Patents, on the other hand, would protect the inventions of the company from being used by any other company. For example, Coca-Cola ingredients are protected and that make them exclusive to the company. On the same note, the company can make use of trademarks to protect the name of the company from being used in any other place in the world. This also applies to products made by the company.