Cyber Security Computer Science 5 questions
Unit VII
1.War driving is a wireless attack. Describe at least four war driving tools and the purpose of each.
Your response should be at least 150 words in length.
2. Briefly describe the best practices for access control, and provide an example of each.
Your response should be at least 150 words in length.
3. Passwords can be attacked by many different avenues. Name and describe three attacks against passwords. What are some of the network defenses against such attacks? Provide a brief description of each.
Your response should be at least 150 words in length.
4 List the account management procedures for securing passwords. Group policy settings allow administrators to set password restrictions on an entire group at the same time. List the attributes, include a description, and recommended settings for this procedure.
Your response should be at least 150 words in length.
5.
Is car hacking a reality or a myth? Here is a short clip from the movie After the Sunset ()—can this really happen? From an authentication perspective, what can you do to help prevent car hacking from occurring? This exercise asks you to think critically about the authentication and account management concepts in this unit and then apply them to a potential threat such as car hacking.
NO word Count needed Short sanswet