SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
This assignment is about chemicals used in some household
materials from everyday life.
1) Any 2 cleaners (Any common household cleaners including
ones used for dishwashing, laundry, floor, etc)
2) Any 2 of the following: cosmetics, makeup, face wash with
microbeads, toothpaste, shaving gel etc
3) Any 2 processed food and common food and drink items such
as bread, colas, cookies, icecream etc.
4) Any 2 solid materials such as plastic bottles, styrofoam, soda
cans or cans, toys, craft material, glue, glitter, etc
When you have picked a total of 8 products, you will look up
the ingredients of each and write down in your own words two
to four facts that you found interesting about all the ingredients.
They can be the function of these ingredients, their effect on
health, any alternatives etc.
Maximum word limit is 200 words. Minimum is 100 words.
Computer Security Fundamentals
by Chuck Easttom
Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Chapter 11 ObjectivesUnderstand how to secure a system
Probe a system for vulnerabilitiesUse Vulnerability
vulnerability scanning toolsEvaluate potential security
consultants
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Understand and be able to conduct basic system reconnaissance.
Describe and use several port scanners.
Understand how to derive useful information about a Web site
from internic or the Netcraft Web site.
Know how to locate useful information about a system or
organization from Internet newsgroup postings.
Understand the use of vulnerability scanners.
Use port monitoring utilities.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
IntroductionSecure the system.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Basics of SecurityPortsProtectPoliciesProbePhysical
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
MBSAMicrosoft Baseline Security Analyzer
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
NessusPopular Vulnerability Scanner
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Getting Professional
HelpCertificationEducationExperienceBackground Checks
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
CertificationsCEHCISSPSecurity+Vendor-specific (Microsoft,
Cisco, and so on)GAIC
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
EducationComputer ScienceEngineeringComputer Information
SystemsSecurity Degrees
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
Background and ExperiencePrior Security ExperienceCriminal
Background CheckCredit CheckReferences Check
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
SummaryInformation The more information you have about the
vulnerabilities and weaknesses of your system, the better
prepared you are to defend it.The more information the hacker
has about your system’s vulnerabilities and weaknesses, the
sooner it will be violated.The tools in this chapter are for the
network and security administrator and are to be used for legal,
not illegal, purposes.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
This assignment is about chemicals used in some household material.docx

Más contenido relacionado

Similar a This assignment is about chemicals used in some household material.docx

Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportJames Gachie
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report Steve Fantauzzo
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Adam Tice
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...Cisco Canada
 
40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AI40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AIJames '​-- Mckinlay
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Barry Greene
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeNowSecure
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to usPeter Wood
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsAlan Kan
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...Cristian Garcia G.
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsDominique Dessy
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Dinis Cruz
 
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxChapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxmccormicknadine86
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewallCisco Canada
 

Similar a This assignment is about chemicals used in some household material.docx (20)

Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AI40 things to do before you spend $1 on AI
40 things to do before you spend $1 on AI
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Mobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the CodeMobile Penetration Testing: Episode III - Attack of the Code
Mobile Penetration Testing: Episode III - Attack of the Code
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
 
Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)Making the case for sandbox v1.1 (SD Conference 2007)
Making the case for sandbox v1.1 (SD Conference 2007)
 
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxChapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewall
 

Más de dmark846

This assignment is designed for the student to examine the antec.docx
This assignment is designed for the student to examine the antec.docxThis assignment is designed for the student to examine the antec.docx
This assignment is designed for the student to examine the antec.docxdmark846
 
This assignment is designed to allow you to demonstrate your underst.docx
This assignment is designed to allow you to demonstrate your underst.docxThis assignment is designed to allow you to demonstrate your underst.docx
This assignment is designed to allow you to demonstrate your underst.docxdmark846
 
This assignment is based on the reading of the book belowKirst.docx
This assignment is based on the reading of the book belowKirst.docxThis assignment is based on the reading of the book belowKirst.docx
This assignment is based on the reading of the book belowKirst.docxdmark846
 
This assignment is a written assignment where students will demo.docx
This assignment is a written assignment where students will demo.docxThis assignment is a written assignment where students will demo.docx
This assignment is a written assignment where students will demo.docxdmark846
 
This assignment is a 5-7 page (double spaced) paper due on April 1st.docx
This assignment is a 5-7 page (double spaced) paper due on April 1st.docxThis assignment is a 5-7 page (double spaced) paper due on April 1st.docx
This assignment is a 5-7 page (double spaced) paper due on April 1st.docxdmark846
 
This assignment is based on writing a grant application for seniors,.docx
This assignment is based on writing a grant application for seniors,.docxThis assignment is based on writing a grant application for seniors,.docx
This assignment is based on writing a grant application for seniors,.docxdmark846
 
This assignment is based on the documentary film Rivers and Tides.docx
This assignment is based on the documentary film Rivers and Tides.docxThis assignment is based on the documentary film Rivers and Tides.docx
This assignment is based on the documentary film Rivers and Tides.docxdmark846
 
This assignment is a written assignment where students will demonstr.docx
This assignment is a written assignment where students will demonstr.docxThis assignment is a written assignment where students will demonstr.docx
This assignment is a written assignment where students will demonstr.docxdmark846
 
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docxThis assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docxdmark846
 
This assignment is an opportunity for you to explore the CSR work of.docx
This assignment is an opportunity for you to explore the CSR work of.docxThis assignment is an opportunity for you to explore the CSR work of.docx
This assignment is an opportunity for you to explore the CSR work of.docxdmark846
 
This assignment is based on a virtual otganization called Baderman I.docx
This assignment is based on a virtual otganization called Baderman I.docxThis assignment is based on a virtual otganization called Baderman I.docx
This assignment is based on a virtual otganization called Baderman I.docxdmark846
 
This assignment is another opportunity to apply the principles o.docx
This assignment is another opportunity to apply the principles o.docxThis assignment is another opportunity to apply the principles o.docx
This assignment is another opportunity to apply the principles o.docxdmark846
 
This assignment is a continuation of a previously created project te.docx
This assignment is a continuation of a previously created project te.docxThis assignment is a continuation of a previously created project te.docx
This assignment is a continuation of a previously created project te.docxdmark846
 
THIS ASSIGNMENT IS AN I-SEARCH RESEARCH PROJECT ABOUT MANTAINING BOU.docx
THIS ASSIGNMENT IS AN I-SEARCH RESEARCH PROJECT ABOUT MANTAINING BOU.docxTHIS ASSIGNMENT IS AN I-SEARCH RESEARCH PROJECT ABOUT MANTAINING BOU.docx
THIS ASSIGNMENT IS AN I-SEARCH RESEARCH PROJECT ABOUT MANTAINING BOU.docxdmark846
 
This assignment is a written assignment where students will demons.docx
This assignment is a written assignment where students will demons.docxThis assignment is a written assignment where students will demons.docx
This assignment is a written assignment where students will demons.docxdmark846
 
This assignment is a mini research paper on levels of care. You will.docx
This assignment is a mini research paper on levels of care. You will.docxThis assignment is a mini research paper on levels of care. You will.docx
This assignment is a mini research paper on levels of care. You will.docxdmark846
 
This assignment is an article review. The article review may be rela.docx
This assignment is an article review. The article review may be rela.docxThis assignment is an article review. The article review may be rela.docx
This assignment is an article review. The article review may be rela.docxdmark846
 
This assignment is an opportunity for you to apply what you lear.docx
This assignment is an opportunity for you to apply what you lear.docxThis assignment is an opportunity for you to apply what you lear.docx
This assignment is an opportunity for you to apply what you lear.docxdmark846
 
This assignment is a research paper. This means you will choose a to.docx
This assignment is a research paper. This means you will choose a to.docxThis assignment is a research paper. This means you will choose a to.docx
This assignment is a research paper. This means you will choose a to.docxdmark846
 
This Assignment is a Case Study PowerPoint presentation in which.docx
This Assignment is a Case Study PowerPoint presentation in which.docxThis Assignment is a Case Study PowerPoint presentation in which.docx
This Assignment is a Case Study PowerPoint presentation in which.docxdmark846
 

Más de dmark846 (20)

This assignment is designed for the student to examine the antec.docx
This assignment is designed for the student to examine the antec.docxThis assignment is designed for the student to examine the antec.docx
This assignment is designed for the student to examine the antec.docx
 
This assignment is designed to allow you to demonstrate your underst.docx
This assignment is designed to allow you to demonstrate your underst.docxThis assignment is designed to allow you to demonstrate your underst.docx
This assignment is designed to allow you to demonstrate your underst.docx
 
This assignment is based on the reading of the book belowKirst.docx
This assignment is based on the reading of the book belowKirst.docxThis assignment is based on the reading of the book belowKirst.docx
This assignment is based on the reading of the book belowKirst.docx
 
This assignment is a written assignment where students will demo.docx
This assignment is a written assignment where students will demo.docxThis assignment is a written assignment where students will demo.docx
This assignment is a written assignment where students will demo.docx
 
This assignment is a 5-7 page (double spaced) paper due on April 1st.docx
This assignment is a 5-7 page (double spaced) paper due on April 1st.docxThis assignment is a 5-7 page (double spaced) paper due on April 1st.docx
This assignment is a 5-7 page (double spaced) paper due on April 1st.docx
 
This assignment is based on writing a grant application for seniors,.docx
This assignment is based on writing a grant application for seniors,.docxThis assignment is based on writing a grant application for seniors,.docx
This assignment is based on writing a grant application for seniors,.docx
 
This assignment is based on the documentary film Rivers and Tides.docx
This assignment is based on the documentary film Rivers and Tides.docxThis assignment is based on the documentary film Rivers and Tides.docx
This assignment is based on the documentary film Rivers and Tides.docx
 
This assignment is a written assignment where students will demonstr.docx
This assignment is a written assignment where students will demonstr.docxThis assignment is a written assignment where students will demonstr.docx
This assignment is a written assignment where students will demonstr.docx
 
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docxThis assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
This assignment is based on FENTY BEAUTY PRODUCTS.Submit the s.docx
 
This assignment is an opportunity for you to explore the CSR work of.docx
This assignment is an opportunity for you to explore the CSR work of.docxThis assignment is an opportunity for you to explore the CSR work of.docx
This assignment is an opportunity for you to explore the CSR work of.docx
 
This assignment is based on a virtual otganization called Baderman I.docx
This assignment is based on a virtual otganization called Baderman I.docxThis assignment is based on a virtual otganization called Baderman I.docx
This assignment is based on a virtual otganization called Baderman I.docx
 
This assignment is another opportunity to apply the principles o.docx
This assignment is another opportunity to apply the principles o.docxThis assignment is another opportunity to apply the principles o.docx
This assignment is another opportunity to apply the principles o.docx
 
This assignment is a continuation of a previously created project te.docx
This assignment is a continuation of a previously created project te.docxThis assignment is a continuation of a previously created project te.docx
This assignment is a continuation of a previously created project te.docx
 
THIS ASSIGNMENT IS AN I-SEARCH RESEARCH PROJECT ABOUT MANTAINING BOU.docx
THIS ASSIGNMENT IS AN I-SEARCH RESEARCH PROJECT ABOUT MANTAINING BOU.docxTHIS ASSIGNMENT IS AN I-SEARCH RESEARCH PROJECT ABOUT MANTAINING BOU.docx
THIS ASSIGNMENT IS AN I-SEARCH RESEARCH PROJECT ABOUT MANTAINING BOU.docx
 
This assignment is a written assignment where students will demons.docx
This assignment is a written assignment where students will demons.docxThis assignment is a written assignment where students will demons.docx
This assignment is a written assignment where students will demons.docx
 
This assignment is a mini research paper on levels of care. You will.docx
This assignment is a mini research paper on levels of care. You will.docxThis assignment is a mini research paper on levels of care. You will.docx
This assignment is a mini research paper on levels of care. You will.docx
 
This assignment is an article review. The article review may be rela.docx
This assignment is an article review. The article review may be rela.docxThis assignment is an article review. The article review may be rela.docx
This assignment is an article review. The article review may be rela.docx
 
This assignment is an opportunity for you to apply what you lear.docx
This assignment is an opportunity for you to apply what you lear.docxThis assignment is an opportunity for you to apply what you lear.docx
This assignment is an opportunity for you to apply what you lear.docx
 
This assignment is a research paper. This means you will choose a to.docx
This assignment is a research paper. This means you will choose a to.docxThis assignment is a research paper. This means you will choose a to.docx
This assignment is a research paper. This means you will choose a to.docx
 
This Assignment is a Case Study PowerPoint presentation in which.docx
This Assignment is a Case Study PowerPoint presentation in which.docxThis Assignment is a Case Study PowerPoint presentation in which.docx
This Assignment is a Case Study PowerPoint presentation in which.docx
 

Último

The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxSaurabhParmar42
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...Nguyen Thanh Tu Collection
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 

Último (20)

The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptx
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 

This assignment is about chemicals used in some household material.docx

  • 1. This assignment is about chemicals used in some household materials from everyday life. 1) Any 2 cleaners (Any common household cleaners including ones used for dishwashing, laundry, floor, etc) 2) Any 2 of the following: cosmetics, makeup, face wash with microbeads, toothpaste, shaving gel etc 3) Any 2 processed food and common food and drink items such as bread, colas, cookies, icecream etc. 4) Any 2 solid materials such as plastic bottles, styrofoam, soda cans or cans, toys, craft material, glue, glitter, etc When you have picked a total of 8 products, you will look up the ingredients of each and write down in your own words two to four facts that you found interesting about all the ingredients. They can be the function of these ingredients, their effect on health, any alternatives etc. Maximum word limit is 200 words. Minimum is 100 words. Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning *
  • 2. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Chapter 11 ObjectivesUnderstand how to secure a system Probe a system for vulnerabilitiesUse Vulnerability vulnerability scanning toolsEvaluate potential security consultants © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Understand and be able to conduct basic system reconnaissance. Describe and use several port scanners. Understand how to derive useful information about a Web site from internic or the Netcraft Web site. Know how to locate useful information about a system or organization from Internet newsgroup postings. Understand the use of vulnerability scanners. Use port monitoring utilities. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * IntroductionSecure the system. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common.
  • 3. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Basics of SecurityPortsProtectPoliciesProbePhysical © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * MBSAMicrosoft Baseline Security Analyzer © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * NessusPopular Vulnerability Scanner © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
  • 4. * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Getting Professional HelpCertificationEducationExperienceBackground Checks © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. CertificationsCEHCISSPSecurity+Vendor-specific (Microsoft, Cisco, and so on)GAIC © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning EducationComputer ScienceEngineeringComputer Information SystemsSecurity Degrees © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
  • 5. * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning Background and ExperiencePrior Security ExperienceCriminal Background CheckCredit CheckReferences Check © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * SummaryInformation The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it.The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated.The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning *