Answer ALL the following;
How Antennas Work.
The purpose of an antenna in a radio transmitter is to launch the radio waves into space. In a receiver, the idea is to pick up as much of the transmitter’s power as possible and supply it to the tuner. The size of a radio antenna is directly related to the frequency of the signal that the antenna is trying to transmit or receive. List the different types of antennas and their applications. Using images of these antennas to help with their descriptions.
It is important to understand that threats to your company’s information assets are present 24/7 and that there is never a time when a threat is not present. Take a look at the following categories of threats. You are in charge of a team that must deal with the below lists of threats. What prevention methods will your team implement to handle the threats? Briefly but thoroughly explain the reasons for your decisions.
1. Acts of human error
2. Software threats
3. Deviations in services
4. Hardware failures or errors
5. Software failures or errors
Attacks, Exploits and Vulnerabilities.
An attack is the act that takes advantage of a vulnerability to compromise an asset, thus resulting in a loss. It is accompanied by a threat-agent that denies, damages or steals an organizations information or physical asset. A vulnerability is an identified weakness in a system, where controls are not present, or not effective or have become obsolete. Below you will find a list of attacks, threat agents and vulnerabilities. Pick five (5) of the below methods. Explain the method in detail and provide suggested prevention controls. For example, if malicious code were on the list below I would first explain the topic and then as suggested controls I would state: The obvious controls are good vulnerability management (e.g., installing patches on a regular basis), up-to-date antivirus, anti-spyware, etc., but there are also policy and awareness controls that guide users behavior (e.g., dont click on links in email, etc). Make sure that your answers are detailed and well supported. You must use a minimum of three outside sources.
Hoaxes with an attached virus
Denial-of-service (DoS) and distributed denial-of-service (DDos) attacks