​Choose 2 of the 3 topics listed below to write a response to. Responses must include:

Choose 2 of the 3 topics listed below to write a response to. Responses must include:

  • Posted a complete and coherent response to the initial discussion topic. Fully addresses the discussion topic or question. Post was at least 200 words. The response adds value to the discussion, and demonstrates understanding of concepts.
  • Includes at least one trustworthy and scholarly resource in the response and uses correct APA formatting for the citation and reference.

Vulnerability Analysis

From the list below, pick the four most significant attacks you would consider in the network security design process. Provide at least four high-level security policies and describe mitigation technologies.

Medium Network Campus Top 10 Attacks

Attack

Identity spoofing

Virus/worm/Trojan horse

Rogue devices

Sniffer

Man-in-the-middle (MITM)

War dialing/driving

Direct access

ARP redirection/spoofing

Remote control software

Buffer overflow

Wireless Security Breach

Research a publicly known security breach that has made news headlines, which involved the attacker(s) exploiting a wireless network.

Write two or three paragraphs describing the specific incident.

Wireless Hacking

n the four (4) labeled files, there are two capture files, a wordlist. and step-by-step directions on how to obtain the WEP and WPA keys. In order to do the exercise, you will need a virtual machine running Kali Linux. Take one of the picture files you get out of any of the 2 capture files and upload it to the discussion. Do not upload a picture that has already been uploaded, as there are many different pictures to choose from. Talk about how you got the file, the exercise, and why wireless security is critical. Note: The plain text traffic file is not included.