SlideShare a Scribd company logo
1 of 6
This assignment is about chemicals used in some household
materials from everyday life.
1) Any 2 cleaners (Any common household cleaners including
ones used for dishwashing, laundry, floor, etc)
2) Any 2 of the following: cosmetics, makeup, face wash with
microbeads, toothpaste, shaving gel etc
3) Any 2 processed food and common food and drink items such
as bread, colas, cookies, icecream etc.
4) Any 2 solid materials such as plastic bottles, styrofoam, soda
cans or cans, toys, craft material, glue, glitter, etc
When you have picked a total of 8 products, you will look up
the ingredients of each and write down in your own words two
to four facts that you found interesting about all the ingredients.
They can be the function of these ingredients, their effect on
health, any alternatives etc.
Maximum word limit is 200 words. Minimum is 100 words.
Computer Security Fundamentals
by Chuck Easttom
Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Chapter 11 ObjectivesUnderstand how to secure a system
Probe a system for vulnerabilitiesUse Vulnerability
vulnerability scanning toolsEvaluate potential security
consultants
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Understand and be able to conduct basic system reconnaissance.
Describe and use several port scanners.
Understand how to derive useful information about a Web site
from internic or the Netcraft Web site.
Know how to locate useful information about a system or
organization from Internet newsgroup postings.
Understand the use of vulnerability scanners.
Use port monitoring utilities.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
IntroductionSecure the system.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Basics of SecurityPortsProtectPoliciesProbePhysical
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
MBSAMicrosoft Baseline Security Analyzer
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
NessusPopular Vulnerability Scanner
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Getting Professional
HelpCertificationEducationExperienceBackground Checks
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
CertificationsCEHCISSPSecurity+Vendor-specific (Microsoft,
Cisco, and so on)GAIC
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
EducationComputer ScienceEngineeringComputer Information
SystemsSecurity Degrees
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
Background and ExperiencePrior Security ExperienceCriminal
Background CheckCredit CheckReferences Check
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
SummaryInformation The more information you have about the
vulnerabilities and weaknesses of your system, the better
prepared you are to defend it.The more information the hacker
has about your system’s vulnerabilities and weaknesses, the
sooner it will be violated.The tools in this chapter are for the
network and security administrator and are to be used for legal,
not illegal, purposes.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
This assignment is about chemicals used in some household material.docx

More Related Content

Similar to This assignment is about chemicals used in some household material.docx

CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportJames Gachie
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report Steve Fantauzzo
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Adam Tice
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...Cisco Canada
 
40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AI40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AIJames '​-- Mckinlay
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to usPeter Wood
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsAlan Kan
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...Cristian Garcia G.
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 

Similar to This assignment is about chemicals used in some household material.docx (20)

CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AI40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AI
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 

More from dmark846

This assignment is based on the documentary film Rivers and Tides.docx
This assignment is based on the documentary film Rivers and Tides.docxThis assignment is based on the documentary film Rivers and Tides.docx
This assignment is based on the documentary film Rivers and Tides.docxdmark846
 
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docxThis assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docxdmark846
 
This assignment is a continuation of a previously created project te.docx
This assignment is a continuation of a previously created project te.docxThis assignment is a continuation of a previously created project te.docx
This assignment is a continuation of a previously created project te.docxdmark846
 
This assignment is a mini research paper on levels of care. You will.docx
This assignment is a mini research paper on levels of care. You will.docxThis assignment is a mini research paper on levels of care. You will.docx
This assignment is a mini research paper on levels of care. You will.docxdmark846
 
This assignment is a mini research paper on levels of care. You .docx
This assignment is a mini research paper on levels of care. You .docxThis assignment is a mini research paper on levels of care. You .docx
This assignment is a mini research paper on levels of care. You .docxdmark846
 
This assignment is a self-assessment on the learning that occurr.docx
This assignment is a self-assessment on the learning that occurr.docxThis assignment is a self-assessment on the learning that occurr.docx
This assignment is a self-assessment on the learning that occurr.docxdmark846
 
This assignment is about you and the effects the outbreak of COVID h.docx
This assignment is about you and the effects the outbreak of COVID h.docxThis assignment is about you and the effects the outbreak of COVID h.docx
This assignment is about you and the effects the outbreak of COVID h.docxdmark846
 
This assignment is about Social Media Analysis for a company from th.docx
This assignment is about Social Media Analysis for a company from th.docxThis assignment is about Social Media Analysis for a company from th.docx
This assignment is about Social Media Analysis for a company from th.docxdmark846
 
This assignment is about content analysis of the ads and articles in.docx
This assignment is about content analysis of the ads and articles in.docxThis assignment is about content analysis of the ads and articles in.docx
This assignment is about content analysis of the ads and articles in.docxdmark846
 
This assignment is a reflection APA paper on the video that is attac.docx
This assignment is a reflection APA paper on the video that is attac.docxThis assignment is a reflection APA paper on the video that is attac.docx
This assignment is a reflection APA paper on the video that is attac.docxdmark846
 
This assignment is a short introduction to thinking more about p.docx
This assignment is a short introduction to thinking more about p.docxThis assignment is a short introduction to thinking more about p.docx
This assignment is a short introduction to thinking more about p.docxdmark846
 
This assignment is a continuation of project already started by Cath.docx
This assignment is a continuation of project already started by Cath.docxThis assignment is a continuation of project already started by Cath.docx
This assignment is a continuation of project already started by Cath.docxdmark846
 
This assignment has two parts.The first is your annotated bi.docx
This assignment has two parts.The first is your annotated bi.docxThis assignment has two parts.The first is your annotated bi.docx
This assignment has two parts.The first is your annotated bi.docxdmark846
 
This Assignment homework is about 100level geography. This is co.docx
This Assignment homework is about 100level geography. This is co.docxThis Assignment homework is about 100level geography. This is co.docx
This Assignment homework is about 100level geography. This is co.docxdmark846
 
This Assignment homework is about 100level geography. This is .docx
This Assignment homework is about 100level geography. This is .docxThis Assignment homework is about 100level geography. This is .docx
This Assignment homework is about 100level geography. This is .docxdmark846
 
This assignment has two parts.Part A Prepare and submit.docx
This assignment has two parts.Part A Prepare and submit.docxThis assignment has two parts.Part A Prepare and submit.docx
This assignment has two parts.Part A Prepare and submit.docxdmark846
 
This assignment is designed to help you analyze civil liberties and .docx
This assignment is designed to help you analyze civil liberties and .docxThis assignment is designed to help you analyze civil liberties and .docx
This assignment is designed to help you analyze civil liberties and .docxdmark846
 
This assignment is designed to help you analyze civil liberties .docx
This assignment is designed to help you analyze civil liberties .docxThis assignment is designed to help you analyze civil liberties .docx
This assignment is designed to help you analyze civil liberties .docxdmark846
 
This assignment is built around the idea of conversations around th.docx
This assignment is built around the idea of conversations around th.docxThis assignment is built around the idea of conversations around th.docx
This assignment is built around the idea of conversations around th.docxdmark846
 
This Assignment has two parts. You will construct an argument in t.docx
This Assignment has two parts. You will construct an argument in t.docxThis Assignment has two parts. You will construct an argument in t.docx
This Assignment has two parts. You will construct an argument in t.docxdmark846
 

More from dmark846 (20)

This assignment is based on the documentary film Rivers and Tides.docx
This assignment is based on the documentary film Rivers and Tides.docxThis assignment is based on the documentary film Rivers and Tides.docx
This assignment is based on the documentary film Rivers and Tides.docx
 
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docxThis assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
 
This assignment is a continuation of a previously created project te.docx
This assignment is a continuation of a previously created project te.docxThis assignment is a continuation of a previously created project te.docx
This assignment is a continuation of a previously created project te.docx
 
This assignment is a mini research paper on levels of care. You will.docx
This assignment is a mini research paper on levels of care. You will.docxThis assignment is a mini research paper on levels of care. You will.docx
This assignment is a mini research paper on levels of care. You will.docx
 
This assignment is a mini research paper on levels of care. You .docx
This assignment is a mini research paper on levels of care. You .docxThis assignment is a mini research paper on levels of care. You .docx
This assignment is a mini research paper on levels of care. You .docx
 
This assignment is a self-assessment on the learning that occurr.docx
This assignment is a self-assessment on the learning that occurr.docxThis assignment is a self-assessment on the learning that occurr.docx
This assignment is a self-assessment on the learning that occurr.docx
 
This assignment is about you and the effects the outbreak of COVID h.docx
This assignment is about you and the effects the outbreak of COVID h.docxThis assignment is about you and the effects the outbreak of COVID h.docx
This assignment is about you and the effects the outbreak of COVID h.docx
 
This assignment is about Social Media Analysis for a company from th.docx
This assignment is about Social Media Analysis for a company from th.docxThis assignment is about Social Media Analysis for a company from th.docx
This assignment is about Social Media Analysis for a company from th.docx
 
This assignment is about content analysis of the ads and articles in.docx
This assignment is about content analysis of the ads and articles in.docxThis assignment is about content analysis of the ads and articles in.docx
This assignment is about content analysis of the ads and articles in.docx
 
This assignment is a reflection APA paper on the video that is attac.docx
This assignment is a reflection APA paper on the video that is attac.docxThis assignment is a reflection APA paper on the video that is attac.docx
This assignment is a reflection APA paper on the video that is attac.docx
 
This assignment is a short introduction to thinking more about p.docx
This assignment is a short introduction to thinking more about p.docxThis assignment is a short introduction to thinking more about p.docx
This assignment is a short introduction to thinking more about p.docx
 
This assignment is a continuation of project already started by Cath.docx
This assignment is a continuation of project already started by Cath.docxThis assignment is a continuation of project already started by Cath.docx
This assignment is a continuation of project already started by Cath.docx
 
This assignment has two parts.The first is your annotated bi.docx
This assignment has two parts.The first is your annotated bi.docxThis assignment has two parts.The first is your annotated bi.docx
This assignment has two parts.The first is your annotated bi.docx
 
This Assignment homework is about 100level geography. This is co.docx
This Assignment homework is about 100level geography. This is co.docxThis Assignment homework is about 100level geography. This is co.docx
This Assignment homework is about 100level geography. This is co.docx
 
This Assignment homework is about 100level geography. This is .docx
This Assignment homework is about 100level geography. This is .docxThis Assignment homework is about 100level geography. This is .docx
This Assignment homework is about 100level geography. This is .docx
 
This assignment has two parts.Part A Prepare and submit.docx
This assignment has two parts.Part A Prepare and submit.docxThis assignment has two parts.Part A Prepare and submit.docx
This assignment has two parts.Part A Prepare and submit.docx
 
This assignment is designed to help you analyze civil liberties and .docx
This assignment is designed to help you analyze civil liberties and .docxThis assignment is designed to help you analyze civil liberties and .docx
This assignment is designed to help you analyze civil liberties and .docx
 
This assignment is designed to help you analyze civil liberties .docx
This assignment is designed to help you analyze civil liberties .docxThis assignment is designed to help you analyze civil liberties .docx
This assignment is designed to help you analyze civil liberties .docx
 
This assignment is built around the idea of conversations around th.docx
This assignment is built around the idea of conversations around th.docxThis assignment is built around the idea of conversations around th.docx
This assignment is built around the idea of conversations around th.docx
 
This Assignment has two parts. You will construct an argument in t.docx
This Assignment has two parts. You will construct an argument in t.docxThis Assignment has two parts. You will construct an argument in t.docx
This Assignment has two parts. You will construct an argument in t.docx
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

This assignment is about chemicals used in some household material.docx

  • 1. This assignment is about chemicals used in some household materials from everyday life. 1) Any 2 cleaners (Any common household cleaners including ones used for dishwashing, laundry, floor, etc) 2) Any 2 of the following: cosmetics, makeup, face wash with microbeads, toothpaste, shaving gel etc 3) Any 2 processed food and common food and drink items such as bread, colas, cookies, icecream etc. 4) Any 2 solid materials such as plastic bottles, styrofoam, soda cans or cans, toys, craft material, glue, glitter, etc When you have picked a total of 8 products, you will look up the ingredients of each and write down in your own words two to four facts that you found interesting about all the ingredients. They can be the function of these ingredients, their effect on health, any alternatives etc. Maximum word limit is 200 words. Minimum is 100 words. Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning *
  • 2. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Chapter 11 ObjectivesUnderstand how to secure a system Probe a system for vulnerabilitiesUse Vulnerability vulnerability scanning toolsEvaluate potential security consultants © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Understand and be able to conduct basic system reconnaissance. Describe and use several port scanners. Understand how to derive useful information about a Web site from internic or the Netcraft Web site. Know how to locate useful information about a system or organization from Internet newsgroup postings. Understand the use of vulnerability scanners. Use port monitoring utilities. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * IntroductionSecure the system. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common.
  • 3. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Basics of SecurityPortsProtectPoliciesProbePhysical © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * MBSAMicrosoft Baseline Security Analyzer © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * NessusPopular Vulnerability Scanner © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
  • 4. * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Getting Professional HelpCertificationEducationExperienceBackground Checks © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. CertificationsCEHCISSPSecurity+Vendor-specific (Microsoft, Cisco, and so on)GAIC © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning EducationComputer ScienceEngineeringComputer Information SystemsSecurity Degrees © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
  • 5. * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning Background and ExperiencePrior Security ExperienceCriminal Background CheckCredit CheckReferences Check © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * SummaryInformation The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it.The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated.The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning *