Select and respond to one of the following. If you use additional resources,
remember to list them at the end of the posting.
- Perform a limited risk management activity on your personal computer.
Conduct an asset identification (hardware, software, devices, etc. ), threat
identification, vulnerability appraisal, risk assessment and risk mitigation.
Under each category, describe the elements that pertain to your system. What
major vulnerabilities did you find? How can you mitigate the risks?
- Your author discusses some of the issues associated with rogue access
points. Find a least one article that focuses on a defense against rogue access
points, and provide a summary as well as a link to the article. In addition,
consider that many phones can now act as wifi access points. Would the defense
you've summarized work with a wifi rogue access point?
the network / password scanning lab using Wireshark (attached here). See the
details in the attached document. Post your findings to the forum.