Author Question: What are the different features offered by project- and issue-tracking software to help developers ... (Read 37 times)

Marty

  • Hero Member
  • *****
  • Posts: 553
What are the different features offered by project- and issue-tracking software to help developers during the design phase of the SDLC?
 
  What will be an ideal response?

Question 2

What are the security challenges faced by wireless networks?
 
  What will be an ideal response?



duke02

  • Sr. Member
  • ****
  • Posts: 312
Answer to Question 1

Project- and issue-tracking software offers useful features to help developers stay abreast of all aspects of their projects. Developers can upload diagrams and documentation, comment on activity, describe challenges, report bugs, and request assistance. The software maintains a complete history of project activity, including dates showing when each module was started and completed and who has been assigned each task. It also offers customizable dashboards so developers can see at a glance how the project is coming along and which activities they need to complete today.

Answer to Question 2

Wireless networks are vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. Local area networks (LANs) using the 802.11 standard can be easily penetrated by outsiders armed with laptops, wireless cards, external antennae, and hacking software. Hackers use these tools to detect unprotected networks, monitor network traffic, and, in some cases, gain access to the Internet or to corporate networks. Wi-Fi transmission technology was designed to make it easy for stations to find and hear one another. The service set identifiers (SSIDs) identifying the access points in a Wi-Fi network are broadcast multiple times and can be picked up fairly easily by intruders' sniffer programs. Wireless networks in many locations do not have basic protections against war driving, in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic. A hacker can employ an 802.11 analysis tool to identify the SSID. An intruder that has associated with an access point by using the correct SSID is capable of accessing other resources on the network, using the Windows operating system to determine which other users are connected to the network, access their computer hard drives, and open or copy their files. Intruders also use the information they have gleaned to set up rogue access points on a different radio channel in physical locations close to users to force a user's radio NIC to associate with the rogue access point. Once this association occurs, hackers using the rogue access point can capture the names and passwords of unsuspecting users.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Aspirin may benefit 11 different cancers, including those of the colon, pancreas, lungs, prostate, breasts, and leukemia.

Did you know?

Certain rare plants containing cyanide include apricot pits and a type of potato called cassava. Fortunately, only chronic or massive ingestion of any of these plants can lead to serious poisoning.

Did you know?

Malaria was not eliminated in the United States until 1951. The term eliminated means that no new cases arise in a country for 3 years.

Did you know?

Malaria mortality rates are falling. Increased malaria prevention and control measures have greatly improved these rates. Since 2000, malaria mortality rates have fallen globally by 60% among all age groups, and by 65% among children under age 5.

Did you know?

A strange skin disease referred to as Morgellons has occurred in the southern United States and in California. Symptoms include slowly healing sores, joint pain, persistent fatigue, and a sensation of things crawling through the skin. Another symptom is strange-looking, threadlike extrusions coming out of the skin.

For a complete list of videos, visit our video library