Identify the malicious threat sources to physical security and their corresponding countermeasures. Describe the main components of a CCTV system. What are some of the concerns with CCTV deployments? Describe three perimeter intrusion detection systems from the physical security domain and give an example of one that you have seen deployed either at work or another location that you are familiar with. Group B Describe the functions of hubs/repeaters, bridges, switches, routers, and gateways. At what layers of the OSI model does each device operate? Describe the different Wireless standards within the 802.11 families. What is a rogue access point, and what do we have to worry about? Describe the differences between bus, ring and star topologies. List the various wiring standards that are available for use within these topologies. Group C Explain the TCP/IP Model. How do the layer’s map to the OSI Model layers? The Transport layer provides two service protocols: UDP and TCP. Explain the differences between the two protocols in terms of guaranteed vs. non-guaranteed service and connection-oriented versus connectionless communication. What is a DoS attack? What is the main target of DOS in terms of Confidentiality, Integrity and Availability? Give an example of a common DoS attack

Leave a Reply

Your email address will not be published. Required fields are marked *