Unformatted text preview: 3. Suppose that an attacker stole a router from an equipment rack in the main data center of a company. What might be this attacker’s intentions? They could be after the IP address of the company and an easier route into the network. They could also be attempting to modify the router to reroute information to them and return it. 4. Suppose that you are the manager of the IT department at a company that is currently working on several government (military technology) contracts. You are checking the status of some equipment in one of the equipment closets and notice a new wireless access point. Should you be concerned? What would you do? You shouldn’t be concerned but you should block that access point from accessing any of the current equipment....
View Full Document
- Spring '11
- Computer Security, IP address, Personal computer, technology company