Author Question: What are the different features offered by project- and issue-tracking software to help developers ... (Read 19 times)

Marty

  • Hero Member
  • *****
  • Posts: 553
What are the different features offered by project- and issue-tracking software to help developers during the design phase of the SDLC?
 
  What will be an ideal response?

Question 2

What are the security challenges faced by wireless networks?
 
  What will be an ideal response?



duke02

  • Sr. Member
  • ****
  • Posts: 312
Answer to Question 1

Project- and issue-tracking software offers useful features to help developers stay abreast of all aspects of their projects. Developers can upload diagrams and documentation, comment on activity, describe challenges, report bugs, and request assistance. The software maintains a complete history of project activity, including dates showing when each module was started and completed and who has been assigned each task. It also offers customizable dashboards so developers can see at a glance how the project is coming along and which activities they need to complete today.

Answer to Question 2

Wireless networks are vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. Local area networks (LANs) using the 802.11 standard can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae, and hacking software. Hackers use these tools to detect unprotected networks, monitor network traffic, and, in some cases, gain access to the Internet or to corporate networks. Wi-Fi transmission technology was designed to make it easy for stations to find and hear one another. The service set identifiers (SSIDs) identifying the access points in a Wi-Fi network are broadcast multiple times and can be picked up fairly easily by intruders' sniffer programs. Wireless networks in many locations do not have basic protections against war driving, in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. A hacker can employ an 802.11 analysis tool to identify the SSID. An intruder that has associated with an access point by using the correct SSID is capable of accessing other resources on the network, using the Windows operating system to determine which other users are connected to the network, access their computer hard drives, and open or copy their files. Intruders also use the information they have gleaned to set up rogue access points on a different radio channel in physical locations close to users to force a user's radio NIC to associate with the rogue access point. Once this association occurs, hackers using the rogue access point can capture the names and passwords of unsuspecting users.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The average adult has about 21 square feet of skin.

Did you know?

Always store hazardous household chemicals in their original containers out of reach of children. These include bleach, paint, strippers and products containing turpentine, garden chemicals, oven cleaners, fondue fuels, nail polish, and nail polish remover.

Did you know?

The average older adult in the United States takes five prescription drugs per day. Half of these drugs contain a sedative. Alcohol should therefore be avoided by most senior citizens because of the dangerous interactions between alcohol and sedatives.

Did you know?

When blood is deoxygenated and flowing back to the heart through the veins, it is dark reddish-blue in color. Blood in the arteries that is oxygenated and flowing out to the body is bright red. Whereas arterial blood comes out in spurts, venous blood flows.

Did you know?

A strange skin disease referred to as Morgellons has occurred in the southern United States and in California. Symptoms include slowly healing sores, joint pain, persistent fatigue, and a sensation of things crawling through the skin. Another symptom is strange-looking, threadlike extrusions coming out of the skin.

For a complete list of videos, visit our video library