Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

WU The Network Security and The Bluetooth Eavesdropping Essay

WU The Network Security and The Bluetooth Eavesdropping Essay

WU The Network Security and The Bluetooth Eavesdropping Essay

Description

Smartphones have become an integral part of our daily lives, be it as a source for business information or for pure personal use. One of the most popular technologies now available for any standard mobile phone is Bluetooth. Bluetooth is a wireless, secure, and international standard that provides communication between the Bluetooth-enabled devices in a short-range network (typically 1-50 meters). Bluetooth connects devices on a personal area network (PAN), such as a computer, printer, scanner, and fax machine, in a home office setup. For smartphones, a user would typically hook up a Bluetooth-enabled earpiece and work with the smartphone hands-free.

Even though Bluetooth is short-range and only available to the devices within the PAN, it can still pose a major security threat, as hackers are now able to develop software that can eavesdrop between Bluetooth devices and a cell phone. There are additional threats that render Bluetooth networks unsecure.

Prepare a 4- to 5-page research paper (APA-formatted) on Bluetooth security. Evaluate the particular security risks posed by Bluetooth devices and specific measures (taken by network security managers and users) that can improve Bluetooth security. Address the following questions:

What is Bluetooth “eavesdropping”? How is this attack attempted, and how can it be avoided?

What is an impersonation attack? How likely is it that this type of attack will work? Why?

How is a pairing attack carried out? What are the main requirements for the attack, and what are some methods for protecting against it?

Find two types of attacks that are associated with problems or flaws with Bluetooth implementation. List these attacks, how they are carried out, how likely they are to succeed, and methods to prevent them.

Discussion 1

Intrusion detection methods depend on the following assumption: that the behavior of an intruder differs measurably from the behavior of a legitimate user. The two methods you learned about for detecting intrusions, statistical anomaly detection and rule-based detection, differ fundamentally in their approach to distinguishing between intruders and legitimate users.

For this Discussion, create and describe a scenario of a set of computer systems and how they are used within a particular organization. Explain how successful each of the detection methods above would be in detecting an intrusion in that scenario. Do you think either one would be able to detect an intrusion in time to prevent the intruder from doing anything malicious? Why or why not?

Discussion 2

Networking monitoring tools allow system administrators the ability to analyze network performance, pinpoints failed network components, send notifications of system outages, and monitors for security issues. There are a large variety of network monitoring tools available commercially and free.

For this discussion read the article “The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins”. Also search Walden University library and the internet for network monitoring tools. Pick two of the network monitoring tools and write a comparison of the features offered in those tools. Specify which tool you feel has the best features.

Assignment: Malicious SoftwareThis unit introduced you to malicious software. It divided malicious software into two broad categories: parasitic software, which are subprograms or fragments of programs that require other system applications or utility software in order to run, and independent malware, which are self-contained programs that can run on their own.

Three key types of malicious software (viruses, worms, and distributed denial of service attacks) were then defined, along with the evolution of methods for handling them.

Part 1: Overview of Malicious Programs

Name and describe the five main categories of malicious software. Provide an example of each that differs from the example provided in the text. Rank these categories from most dangerous to least dangerous, and provide a rationale for your ranking.

Part 2: Key Topics

Explain the fundamental differences between viruses, worms, and distributed denial of service attacks (DDoS).

Part 3: Countermeasures

  • Describe the countermeasures available to defend against viruses. How did these countermeasures evolve? Are the current countermeasures sufficient for handling existing virus threats? Why or why not?
  • Describe the countermeasures available to defend against worms. How do these compare to those available for viruses? How are countermeasure schemes combined to combat worms?
  • Describe the countermeasures available to defend against DDoS attacks. Are these countermeasures sufficient for handling existing attack methods? How do you believe they could evolve to provide greater protection? 

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20