Discussion board forums for Mission Plan 5This document contains a list of discussion board forums for the mission plan listed in the title above. Each discussion board forum listed in this document has a matching entry in your Blackboard Discussion Board folder as a forum. Since all that is contained in the Blackboard Discussion Board forum entry is a link to this document, you must follow the instructions detailed here for each discussion board forum assignment.
When you are ready to contribute to the Discussion Board forum, be sure that you make your entry within a new Thread and for the correct forum. To get information on how to use the Blackboard Discussion board, click on the following link: http://screencast.com/t/PQU6znZhIpp
All discussion board assignments are required and are worth 3 points. For information pertaining to the grading detail, please view the rubrics for each discussion board entry within Blackboard.
To access a discussion board topic, click on the appropriate topic link below:
Topic 5-1: Discuss common, modern day attacks on wireless networks.
Topic 5-2: Discuss security related topics pertaining to Bluetooth technologies.
Topic 5-3: Discuss wireless best practices.
Once an attacker discovers a wireless
network and connects to it, an attack can happen. Here are a
few attacks that can be made against a wireless network
(click here to get an overview of these attacks):
Eavesdropping
Stealing data
Injecting malware
Storing illegal content
Launching denial of service attacks
Impersonating a legitimate network
Stealing DNS traffic
In this discussion I would like each of you to uniquely define the following:
A common wireless technology used everywhere these days is Bluetooth. Despite the fact that with Bluetooth technology you can connect to a wide range of devices, it is often overlooked with regards to security. This discussion will give Bluetooth some focus with regards to security, such as with bluejacking and bluesnarfing attacks. The list below itemizes a few Bluetooth technologies:
In this discussion I would like each of you to define the following:
A few common practices were were already mentioned, but there are more.
In this discussion board project you will further define one of the best practices listed below; provide a short summary of what your topic means and what makes it a concern with regards to information security.