Wednesday, June 12, 2019

Network Access Using Correct Credentials Coursework - 1

Network Access Using Correct Credentials - Coursework ExampleAdditionally, other perverted computers like automatic dialing the internet may also be an indicator. Further, use of keyloggers can be essential in keeping a log of the telephone number of times your account has been accessed. However, copying of small files may not increase network activity significantly so it may be hard to detect. Furthermore, divided folders are freely accessible on the network without the use of a password.The situation discussed above differs from packet sniffing. In it, there is no software necessary to access the folders as they are already shared and the password is also known. Additionally, packet sniffing is an illegal practice of intercepting network traffic to and from a computer on a network. The limit of what may be accessed through both of these methods is also different. While packet sniffing can access everything sent over the network, the above scenario does not include much(prenomi nal) capabilities. Using password to access a local anesthetic computer is much easier than packet sniffing.The situation in question 2 is reliable and very likely in a work situation. Numerous cases of employees stealing information from their colleagues have been reported. One simple way for protection in such case is the change of password. Changing passwords constantly will ensure that someone has difficulty ever using your password to access your computer. Another method is by use of the firewall. A firewall may be a hardware or a software program which restricts unauthorized external access to a local machine or an internal network. Additionally, a review of which folders and files to share and which not to share is also important.The designers who had their systems attacked by a worm and their designs stolen would have known of this impact and subsequent theft of designs. An antivirus software installed on the computer is one sure way for such detection.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.