Dropbox6

.docx

School

St. Petersburg College *

*We aren’t endorsed by this school

Course

4321

Subject

Electrical Engineering

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by ramsisbnixon

Report
1. What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies ? (Chapter 11) Wireless devices leverage radio waves to transmit signals over a distance. Different frequencies ranges are designated for different uses such as wireless networks, AM, FM, VHF, and television. There are different technologies employed by wireless devices to maximize their use of the available radio frequencies include spread spectrum, FHSS, DSSS, OFDM, Cell phones, Bluetooth, RFID, and NFC. Spread spectrum occurs over multiple frequencies at the same time, so a message is broken into pieces and all are sent at the same time but on different frequencies. FHSS stands for Frequency Hopping Spread Spectrum which is similar to spread spectrum but it transmits data in a series while constantly changing the frequency in use. The entire range is available, however only one is used at a time. Another technology use of radio frequency is DSSS, which is Direct Sequence Spread Spectrum. DSSS leverages all available frequencies simultaneously and in parallel, which has a higher data throughput than FHSS. DSSS has a special encoding mechanism, chipping code to allow the a receiver to restructure the data even if there is interference. Another variation of frequency use is OFDM, Orthogonal Frequency- Division Multiplexing which employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. Cellphones also leverage radio wave frequencies to interact with the carrier’s network. Additionally, Bluetooth provides users personal area networks (PAN) to be used for headphones, computer mouse, keyboards, etc. RFID – Radio Frequency Identification is a tracking technology by using a radio transmitter using current generated antenna when placed in a magnetic field. Many retailers and manufacturers use RFID for asset tracking. The last use to mention of NFC – Near-field communication to connect devices in very
close proximity. However NFC can be vulnerable to man-in-the-middle, eavesdropping, data manipulation, and replay attacks. 2. What are some security issues with email and options for safeguarding against them? (Chapter 12) Email is one of the most common forms of communication in a professional setting and a common attack vector. Email servers leverage Simple Mail Transfer Protocol (SMTP) to accept and transport to user’s server-based inbox. Basic email is not secure, but there are several ways to secure this kind of communication. If organizations do not secure emails they risk loss of classified information, phishing, integrity loss of messages, data leaks, and trojan attacks. One- way organizations can secure email is creating an acceptable use policy for email users. Another way is to limit access control and only allow legitimate access and some level of privacy. Trojans and worms sent through email spoofing can be avoided by leveraging technology like Proofpoint and Sender Policy Framework (SPF). Secure Multipurpose Internet Mail Extensions (S/MIME) is an email security standard that offers authentication and confidentiality to email through public key encryption and digital signatures. Another way organizations can authenticate, confidential, integral, and nonrepudiation for email messages is through MIME Object Security Services (MOSS), Privacy Enhanced Mail (PEM), and DomainKeys Identified Mail (DKIM). Organizations can also implement Pretty Good Privacy (PGP) using a variety of encryption algorithms to encrypt files and messages.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help