Solved by verified expert:Read Jack’s Wine and Coffee Shop – A Start-Up Case Study, linked in the Resources under the Required Resources heading.DeliverableWrite 4–6 pages that describe network operating system threats and vulnerabilities that will provide the foundational information to select the appropriate technologies for the case study business.Explain the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting.Describe threats and vulnerabilities specific to operating systems including: Denial of service and distributed DOS/BOTS.Malicious activity detection and forms of attacks.Sniffing, spoofing, and session hijacking.Describe the threats and adversaries that are specific to the use of wireless networks.Describe the components and methods of compromising wireless networks, including the following: MAC spoofing, Web app attacks, and 0-day exploits (National Centers of Academic Excellence in Information Assurance/Cyber Defense, 2013).Backdoors, trojans, viruses, and wireless attacks.Denial of service and distributed DOS/BOTs.Session hijacking and man-in-the-middle attacks.Password guessing and cracking.Packet sniffing.Additional RequirementsWritten communication: Written communication is free of errors that detract from the overall message.APA formatting: Use current APA style and formatting guidelines.Length: 4–6 pages, excluding the references page.Font and font size: Times New Roman, 12 point.Criteria Non-performance Basic Proficient Distinguished Explain the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. Does not explain the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. Explains incompletely or inaccurately the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. Explains the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting. Explains the network security vulnerabilities that are created through ineffective implementation of NAT, port configuration, and subnetting, including the use of supporting examples. Describe threats and vulnerabilities specific to operating systems Does not describe threats and vulnerabilities specific to operating systems. Describes incompletely or inaccurately threats and vulnerabilities specific to operating systems. Describes threats and vulnerabilities specific to operating systems. Describes threats and vulnerabilities specific to operating systems, including the use of supporting examples. Describe the threats and adversaries that are specific to the use of wireless networks. Does not describe the threats and adversaries that are specific to the use of wireless networks. Describes incompletely or inaccurately the threats and adversaries that are specific to the use of wireless networks. Describes the threats and adversaries that are specific to the use of wireless networks. Describes the threats and adversaries that are specific to the use of wireless networks, including the use of supporting examples. Describe the components and methods of compromising wireless networks. Does not describe the components and methods of compromising wireless networks. Describes incompletely or inaccurately the components and methods of compromising wireless networks. Describes the components and methods of compromising wireless networks. Describes the components and methods of compromising wireless networks, including the use of supporting examples.
jack_s_wine_and_coffee_shop___a_start_up_case_study.docx
Unformatted Attachment Preview
Jack’s Wine and Coffee Shop – A Start-Up
Case Study
Jack Tower has had a dream for years to begin a coffee and wine shop that he can run in his
neighborhood in his retirement. He has finally achieved the financial goals necessary to embark
on the adventure and has leased the space. He has set about hiring experts to help him get his
business up and running, and you are his choice for providing him the guidance he needs to set
up an efficient and secure data and communications network. His ultimate goal is to run a small
shop with no plans for growth or expansion.
Your first task is to establish the necessary technological components that Jack will need to
purchase in order to make the network successful. You will also identify design considerations
related to virtual, cloud, wireless, point of sale, or other solutions, as well as consideration of
building a traditional wired network.
The second facet of this project is to hone in on the applications and database software that are
appropriate for use in Jack’s shop. Among the most important items to consider are the security
controls that are available and are easily administered.
The third facet of this project is to research network operating system threats and vulnerabilities
as preparation for selecting the most appropriate NOS software to use in support of Jack’s new
business.
The fourth component of this project is to review the means by which the application and
database software vulnerabilities that you have identified can be mitigated in order to ensure that
there are no unknown features that would hinder the proper selection of technologies.
The fifth component of this project is to review the means by which the network operating
system threats and vulnerabilities faced by this project can be mitigated in order to ensure that
there are no unknown features that would hinder the proper selection of technologies.
The sixth component of this project is to explore the role of encryption in the development of
Jack’s network by gathering foundational information that highlights the way this tool can be
integrated into various aspects of the technologies.
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more