Friday, April 26, 2019

Network Access Using Correct Credentials Coursework - 1

Network Access Using Correct Credentials - Coursework ExampleAdditionally, other abnormal computers c be automatic dialing the internet may also be an indicator. Further, enforce of keyloggers can be essential in keeping a log of the number of times your account has been admission feeed. However, copying of small files may not increase network activity significantly so it may be hard to detect. Furthermore, packaged folders are freely accessible on the network without the use of a countersign.The situation discussed above differs from packet sniffing. In it, there is no software required to access the folders as they are already shared and the password is also known. Additionally, packet sniffing is an illegal practice of intercepting network traffic to and from a computer on a network. The limit of what may be accessed through both of these methods is also different. While packet sniffing can access e verything sent over the network, the above scenario does not include such cap abilities. Using password to access a local computer is much easier than packet sniffing.The situation in question 2 is real and very likely in a work situation. Numerous cases of employees stealing information from their colleagues have been reported. One primary way for protection in such case is the change of password. Changing passwords constantly will tally that someone has difficulty ever using your password to access your computer. Another method is by use of the firewall. A firewall may be a hardware or a software program which restricts unlicenced external access to a local machine or an internal network. Additionally, a review of which folders and files to share and which not to share is also important.The designers who had their systems attacked by a worm and their designs stolen would have known of this intrusion and later(prenominal) theft of designs. An antivirus software installed on the computer is one sure way for such detection.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.