Tarea 10 Chávez Onofre Gonzalo Seguridad Informática 2707
Tarea 10 Chávez Onofre Gonzalo Seguridad Informática 2707
Tarea 10 Chávez Onofre Gonzalo Seguridad Informática 2707
SEGURIDAD INFORMÁTICA
Ingeniería en Computación
Grupo: 2707
Tarea X
ALUMNO:
Chávez Onofre Gonzalo
PROFESOR:
Ing. Erik de Jesús Neria Orozco
Baseband
SEGURIDAD INFORMÁTICA
The baseband and broadband are the types of signalling techniques. These terminologies
were developed to categorise different types of signals depending on particular kind of
signal formats or modulation technique.
The prior difference between baseband transmission and broadband transmission is that
in the baseband transmission the whole bandwidth of the cable is utilized by a single
signal. Conversely, in the broadband transmission, multiple signals are sent on multiple
frequencies simultaneously using a single channel.
Comparison Chart
BASIS FOR
BASEBAND TRANSMISSION BROADBAND TRANSMISSION
COMPARISON
Application Work well with bus topology. Used with a bus as well as tree
topology.
Signal range Signals can be travelled over Signals can be travelled over long
short distances distances without being attenuated.
OSI Model
Wireshark is a network packet analyzer. A network packet analyzer will try to capture
network packets and tries to display that packet data as detailed as possible.
You could think of a network packet analyzer as a measuring device for examining what’s
happening inside a network cable, just like an electrician uses a voltmeter for examining
what’s happening inside an electric cable (but at a higher level, of course).
In the past, such tools were either very expensive, proprietary, or both. However, with the
advent of Wireshark, that has changed. Wireshark is available for free, is open source, and
is one of the best packet analyzers available today.
Code signing best practices for generating and storing private keys in a secure manner.
DigiCert recommends that developers take precautions with the code signing process and
the private key associated with their signing certificate.
Recommendations:
Limit access to keys
Maintain access controls to and accounting of code signing keys and limit their distribution.
This will help enforce strict accountability for key use.
Physically secure the key storage device in a locked container
o Ensure key storage devices are not left on desks, in unlocked drawers, or
where they can be easily taken or copied.
o Keep the device storing the private key in a locked desk drawer or cabinet
or otherwise behind locked doors.
Use a strong password for private key
Choose a strong password for the private key. We require having at least sixteen (16)
characters that are randomly generated containing uppercase letters, lowercase letters,
numbers, and symbols to transport private keys. Words in a dictionary, derivatives of user-
IDs, common character sequences (e.g., "123456"), proper names, geographical
locations, common acronyms, slang, family member names, birthdays, etc. are not to be
used.
Secure storage for private key
Securely store a private key using a FIPS 140-2 Level 2 certified cryptographic device.
Export of the private key is not allowed by these cryptographic devices. Most of these
devices include multi-factor authentication.
Test Signing certificate vs Release Signing certificate
Microsoft recommends using a separate Test signing certificate to sign prerelease code.
The Test signing certificate should only be trusted in the test environment. Test signing
certificates can be a self-signed certificate or come from an internal test CA.