It's Late is a regional coffee shop that serves quick, casual food such as sandwiches, soups,...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
"It's Late" is a regional coffee shop that serves "quick, casual food" such as sandwiches, soups, and salads. Each location also provides free wireless LAN access to its customers. Recently one of the location's networks was successfully attacked and personal customer information was stolen, such as names, email addresses, birthdates, and similar information. It was found that the attack was a password attack and as a consequence the attacker broke into a manager's account and got all the information. [Source: M. Ciampa, Security+ Guide to Network Security Fundamentals, 5th ed. Cengage, 2018.] Answer the following questions for the above case study: a. Identify the possible reasons behind this attack for being successful. ANSWER a): b. Propose your suggestion to the manager as defence mechanism for password attack to avoid future attack. ANSWER b): c. After this attack the management is considering to use different type of authentication mechanism (instead of password authentication). Propose two possible alternates of password authentication and justify your answer for suitability in the above mentioned scenario. "It's Late" is a regional coffee shop that serves "quick, casual food" such as sandwiches, soups, and salads. Each location also provides free wireless LAN access to its customers. Recently one of the location's networks was successfully attacked and personal customer information was stolen, such as names, email addresses, birthdates, and similar information. It was found that the attack was a password attack and as a consequence the attacker broke into a manager's account and got all the information. [Source: M. Ciampa, Security+ Guide to Network Security Fundamentals, 5th ed. Cengage, 2018.] Answer the following questions for the above case study: a. Identify the possible reasons behind this attack for being successful. ANSWER a): b. Propose your suggestion to the manager as defence mechanism for password attack to avoid future attack. ANSWER b): c. After this attack the management is considering to use different type of authentication mechanism (instead of password authentication). Propose two possible alternates of password authentication and justify your answer for suitability in the above mentioned scenario.
Expert Answer:
Answer rating: 100% (QA)
a the possible reasons behind this attack for being successful Weak PasswordsThe manager might have used a weak or easily guessable password making it ... View the full answer
Related Book For
Posted Date:
Students also viewed these computer network questions
-
Two companies, Energen and Hastings Corporation, began operations with identical balance sheets. A year later, both required additional manufacturing capacity at a cost of $50,000. Energen obtained a...
-
What are the criticisms faced by the policy mix of using fiscal policy to achieve internal balance and monetary policy to achieve external balance? What happens when the additional objectives of...
-
For the voltage-divider configuration of Fig. 5.170: a. Determine AVNL, Zi, and Zo. b. Sketch the two-port model of Fig. 5.63 with the parameters determined in part (a) in place. c. Calculate the...
-
Name and explain two allocation rules and two allocation keys. Why are allocation rules and keys important to lower-level management? If you were a site manager in a chemical company, with a single...
-
Air at a flow rate of 12,000 scfm (60?F, 1 atm) and containing 0.5 mol% ethyl acetate (EA) and no water vapor is to be treated with activated carbon (C) (?b = 30 lb/ft3) with an equivalent particle...
-
Dean purchased a lawnmower from a local garden centre. The lawnmower cost $750, and he also purchased extra parts, which cost an additional $325. After using it twice, the lawnmower breaks. Dean...
-
For the circuit of Fig.4.141 (a) Does VC increase or decrease if RB is increased? (b) Does IC increase or decrease if β is reduced? (c) What happens to the saturation current if...
-
Write a function resize(self, new_capacity: int) -> None that changes the capacity of the underlying storage for the elements in the dynamic array. It does not change the values or the order of any...
-
Often, large or complex writing projects are done collaboratively. Collaborative writing projects require input from several different people and often produce a final product with more ideas and...
-
Suppose we encode text by converting the underlying sequence of characters via ASCII to a sequence of numbers in {0,..., 255}. What sequence of numbers would you get from the string...
-
A high-quality customer service is essential if you want to develp a high growth, high retention business. No one starts out perfect, so we hope the customer service ideas towards operational...
-
The author of the article refers to Samsung as having once been a copycat manufacturer. What extent do you consider the creation of the VIP centre to be an example of copycat behaviour?
-
1.3 In ANN, what input values will cause the processing unit below to produce an output of 0. (3) -2 5
-
Mustang Co (Mustang) manufactures automobiles. It has a December 31 year end. The company purchases its auto parts from a wide range of suppliers across North America. When factory staff need auto...
-
If a test has high reliability. O the test measures what the authors of the test claim it measures O people who take the same test twice get approximately the same scores both times O scores on the...
-
Using online resources, identify a significant innovation that came about as a result of the 2020 COVID-19 pandemic. Describe the process by which the innovation was developed. Did the actual process...
-
In your opinion, which one decision has made the greatest impact on Vikings success? Why?
-
Describe how budgets may be helpful for methods improvement in restaurant operations. What kinds of information would you hope to gain from the budgets?
-
The following experimental data are available for \(\mathrm{CO}_{2}\) gas at \(92^{\circ} \mathrm{C}\) : PR 1 2 3 4 6 8 10 0.856 0.583 0.535 0.620 0.800 0.975 1.160 Find the fugacity of CO2 at 100...
-
What do you mean by extent of reaction? Derive an expression of the relationship between mole fraction of the component and the extent of reaction.
-
Give an informatory note on equilibrium constant of the chemical reaction.
Study smarter with the SolutionInn App