Preview

unit 7 security threats

Satisfactory Essays
Open Document
Open Document
449 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
unit 7 security threats
Unit 5 p2introduction of network tools.

The purpose of networking tools: Networking tools are the tools used in a network to manage the network and to make it simpler and easier for you to troubleshoot problems and fixing a network by providing effective support through software’s like HP openview, Cisco works and wireshark.
HP Open View
HP open view is a network and systems management monitoring tools. Also has a bundle of applications that perform a big range of services for a big network. It is mainly used for monitoring servers, devices, networks, databases & applications to make sure that faults are detected and alerted upon in a reasonable time. To control the situation when monitoring to make sure alerts is received before a fault happens. This give you time to fix a problem before it grows into a bigger problem and affects the business.
The bundle provides software for monitoring, configuring and testing along with fault detection and avoidance software
Purpose
Core OS baseline monitoring
Database monitoring
Application component monitoring
Application specific monitoring

Cisco Works
Cisco Works is a bundle of applications that can be used to configure LAN networks easily and efficiently, it includes error management software, Resource management software and a resource monitoring software. For example it provides real-time detailed detection, analysis, and reporting of device faults; often identifies problems before users realize they exist.

Purpose:
It simplifies the cisco network
Fault analysis is provided and tracking network responses
Workforce engine is also included.

Wireshark
Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. It lets you capture and interactively browse the traffic running on a computer network. Wireshark is a network protocol and packet analyser,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. Port Scanning is the usage of software to find what ports are open on a network or on an individual computer, and which services are using those ports.…

    • 216 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Wireshark provides detailed information about network traffic down to the packet level. However, many are…

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computers use network protocols to communicate with computer network there are many network protocols as Hallberg (2005, p92) said “for example, transmission control protocols/internet protocols (TCP/IP) defines a set of rules used to send data from one node on a network to another node”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1. Explain how children and young people’s development is influenced by a range of personal factors (2.1)…

    • 2861 Words
    • 12 Pages
    Good Essays
  • Good Essays

    “Harm is to be taken to include not only ill treatment (including sexual abuse and forms of ill treatment which are not physical) but also the impairment of or an avoidable deterioration in physical or mental health and the impairment of physical, intellectual, emotional, social or behavioural development:” No Secrets (DH/Home Office 2000) based on the Children Act…

    • 511 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unit514 Safeguarding4 1 3

    • 3187 Words
    • 9 Pages

    1.1 Analyse the differences between the concept of safeguarding and the the concept of protection in relation to vulnerable adults.…

    • 3187 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Safeguarding Unit 204

    • 1034 Words
    • 5 Pages

    • Injuries in a variety of stages or injuries that have not received medical attention.…

    • 1034 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 1

    • 468 Words
    • 2 Pages

    that come with the operating system. You have also set up training to show and observe the IT…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network access to the plant data sources (Control systems, HMI systems and historians) that VantagePoint will…

    • 4728 Words
    • 26 Pages
    Satisfactory Essays
  • Powerful Essays

    Another external force is technology. Since the software design and development for the monitoring system is outsourced to a firm in India it is difficult to control and monitor progress. Therefore, Mukerjee who is responsible for this task is spending most of his time in India and he can’t talk about the integration of software and hardware into the design with O’Brien who is senior engineering manager.…

    • 1070 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab VIEW Case Study

    • 1767 Words
    • 8 Pages

    LabVIEW Express technology transforms common measurement and automation tasks into much higher-level, intuitive VIs, allowing beginners to quickly develop applications. For experienced programmers, LabVIEW's performance, flexibility, and compatibility is comparable to that of a traditional programming language such as C or BASIC. Indeed, LabVIEW uses similar constructs, such as variables, data types, objects, looping, and sequencing structures as well as error handling. LabVIEW also allows programmers to reuse legacy DLL and shared librariy code, and integrate with other software using ActiveX, TCP, and other standard…

    • 1767 Words
    • 8 Pages
    Good Essays
  • Good Essays

    With the use of such monitoring system, as explained by CMC industrial Electronics, operational efficiency is ensured. A lot of time delaying errors such as mechanical, human or Symantec errors will be avoided. Efficiency is also the key in allowing the company to evolve and develop. As the saying, being too careful will provide quality service that everyone would want, but it would take up a lot of time. By having a monitoring system to follow, the company is able to save time and provide maximum assistance and satisfaction to all the employees and clients.…

    • 10036 Words
    • 38 Pages
    Good Essays
  • Powerful Essays

    The tool can be extensively used to monitor a weekly statistics for your application to be tested. It can gather CPU and memory level statistics .It can be used to raise alarm, if a threshold limit is being reached. This helps the developer to quickly look into the issue any time any hour. The data that it provides is both Graphical and excel representation which helps anyone to understand where and what the issue is. It had a feature called Dashboard which helps us in customizing the information that we need to monitor. Introscope® provides the ability to monitor, control and manage critical J2EE applications for higher availability, better performance and greater…

    • 988 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    What Is 8.2 Work Design

    • 815 Words
    • 4 Pages

    Designs and develops software application tools and utilities for diagnostics purposes, database modification, and CRT display enhancements…

    • 815 Words
    • 4 Pages
    Satisfactory Essays