ICTNWK411 Report: Software Deployment to Networked Computers Analysis
VerifiedAdded on 2022/11/14
|16
|2787
|300
Report
AI Summary
This report, prepared for the ICTNWK411 module, delves into the critical aspects of software deployment on networked computers. It begins with an overview of IT procurement procedures, detailing procurement planning, market research, solicitation, award, and contract management. The report then examines the role of IT contractors and their relationship with businesses. A significant portion is dedicated to information security procedures, including AUP, ACP, BCP, and other essential policies. The core of the report analyzes the functionalities, technical specifications, system requirements, updates, licensing, and security issues of Windows 10, Adobe Dreamweaver, SAP, and Wireshark. The analysis covers the main functions, technical specifications, optimization strategies, minimum system requirements, available updates, licensing agreements, and security vulnerabilities of each software. Specifically, it explores Windows 10's features like booting, memory management, data security, and the return of the Start Menu. For Dreamweaver, it covers coding, streamlined user platforms and system requirements. SAP's functionality in materials, quality, sales, and distribution management, is examined. Finally, Wireshark's packet analysis capabilities and network configuration are discussed, providing a comprehensive view of software deployment and its associated challenges.

Running head: ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
ICTNWK411 Deploy Software to Networked Computers
Assignment 1
Name of the Student
Name of the University
Author’s Note
ICTNWK411 Deploy Software to Networked Computers
Assignment 1
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Answer to question 1:
The procurement procedures of Information Technology comprise of different
procedures or process like procurement planning, market research, solicitation as well as
award and management and closeout. While the normal procurement of IT services spreads
numerous process characteristics as well as they are treated under the Florida Law. The IT
procurement changes frequently (Grandia, Steijn and Kuipers 2015). Furthermore, the
procurement process consists the risk which may materialize the hidden price, adverse
outcome and unforeseen delayed prices.
Procurement planning is the key finding of any IT procurements. The business needs
to be clearly defined to plan an IT procurement. After defining the business objective, the
procurement plan needs to be developed by various methods of the procurement. The
methods of procurement are State term contracts, Single source, Alternate contract source,
Formal solicitation, informal quotation and exempt procurements (Hughes, Cox and Akhir
2016). Market research comprises activities which lead to understand the competition in the
market, realistic price estimation, schedules and newest innovation. The market research
consists of some methods like Request for information, pre-solicitation, finalize statement of
the operations, update the procurement plan. The solicitation and award phase started after
the final approval of the procurement plan, it comprises of many factors like solicitation,
evaluation, negotiation and award (Cordell and Thompson 2019). The contracts need to be
monitored as well as evaluated with respect to life cycle of the contract. The important sector
of maturing the methods is to evaluate and improve the experience.
Answer to Question 2:
IT providers give skills to the customers on the business to business. Contractors are
hired to fill the short-term gaps in the projects. Contractors operate directly for end customers
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Answer to question 1:
The procurement procedures of Information Technology comprise of different
procedures or process like procurement planning, market research, solicitation as well as
award and management and closeout. While the normal procurement of IT services spreads
numerous process characteristics as well as they are treated under the Florida Law. The IT
procurement changes frequently (Grandia, Steijn and Kuipers 2015). Furthermore, the
procurement process consists the risk which may materialize the hidden price, adverse
outcome and unforeseen delayed prices.
Procurement planning is the key finding of any IT procurements. The business needs
to be clearly defined to plan an IT procurement. After defining the business objective, the
procurement plan needs to be developed by various methods of the procurement. The
methods of procurement are State term contracts, Single source, Alternate contract source,
Formal solicitation, informal quotation and exempt procurements (Hughes, Cox and Akhir
2016). Market research comprises activities which lead to understand the competition in the
market, realistic price estimation, schedules and newest innovation. The market research
consists of some methods like Request for information, pre-solicitation, finalize statement of
the operations, update the procurement plan. The solicitation and award phase started after
the final approval of the procurement plan, it comprises of many factors like solicitation,
evaluation, negotiation and award (Cordell and Thompson 2019). The contracts need to be
monitored as well as evaluated with respect to life cycle of the contract. The important sector
of maturing the methods is to evaluate and improve the experience.
Answer to Question 2:
IT providers give skills to the customers on the business to business. Contractors are
hired to fill the short-term gaps in the projects. Contractors operate directly for end customers

2
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
or locate the assignments by recruitment agencies. All contract operations are conducted on
the business to business among the customers and the contractor’s organization. Contractors
earn more than the permanent employees. IT contractor does not get any benefits that are
afforded to the employees (Zandvliet and Anderson 2017). They do not get any perks related
to the traditional employment like enrolment in the contributory pension plan.
Answer to Question 3
The information security procedures comprise of AUP (Acceptable Use Policy), ACP
(Access Control Policy), BCP (Business Continuity Plan), Disaster recovery procedure,
Email Communication Policy, Remote Access Policy, IS policy, IR policy. The
organization’s information system procedures are extremely high which has an ability to
cover the huge number of security managements. The main information security procedure is
delivered by the organization to guarantee that all employees who use the assets of
information technology should comply with the st6ated rules and regulations. Many
organizations deliver a form which states all the policies and the procedures of using the
assets of the information technology and the employee needs to be signed the form which
states that they have read all the policies, and will follow all the rules and regulations of the
assets. This policy is structured for the employees to locate that there are rules regarding the
information technology assets and no one should violate the stated rules and regulations of
the assets.
Windows 10
Functions
The major functions of windows 10 operating system are:
Booting: It is the process of initializing the computer operating system to operate. It
checks computer system and make the system ready to be operable.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
or locate the assignments by recruitment agencies. All contract operations are conducted on
the business to business among the customers and the contractor’s organization. Contractors
earn more than the permanent employees. IT contractor does not get any benefits that are
afforded to the employees (Zandvliet and Anderson 2017). They do not get any perks related
to the traditional employment like enrolment in the contributory pension plan.
Answer to Question 3
The information security procedures comprise of AUP (Acceptable Use Policy), ACP
(Access Control Policy), BCP (Business Continuity Plan), Disaster recovery procedure,
Email Communication Policy, Remote Access Policy, IS policy, IR policy. The
organization’s information system procedures are extremely high which has an ability to
cover the huge number of security managements. The main information security procedure is
delivered by the organization to guarantee that all employees who use the assets of
information technology should comply with the st6ated rules and regulations. Many
organizations deliver a form which states all the policies and the procedures of using the
assets of the information technology and the employee needs to be signed the form which
states that they have read all the policies, and will follow all the rules and regulations of the
assets. This policy is structured for the employees to locate that there are rules regarding the
information technology assets and no one should violate the stated rules and regulations of
the assets.
Windows 10
Functions
The major functions of windows 10 operating system are:
Booting: It is the process of initializing the computer operating system to operate. It
checks computer system and make the system ready to be operable.

3
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Memory Management: The memory of a system cannot be managed without the
operating system. Various programs and their data execute in the memory at one time,
without the windows 10 the programs may get mixed with them which results in
improper working of the system.
Loading and Execution: Every program gets loaded before it is executed in the
system. Windows 10 allow the program to load in the memory and then help the
program to execute in the system.
Data Security: The most important function of Windows 10 is the data security. It
provides security to the day from various misuse, deletion or modification (Gilad-
Bachrach et al. 2016).
Disk Management: Windows 10 provide disk management facility by managing the
stored folders and the files in the system.
Technical specifications
The top features of windows 10 are as follows:
Return of the Start Menu: Windows 10 return the start menu in the left bottom side of
the screen of system. Whenever a user clicks on the left bottom side of the screen it
displays the pinned, recent and most used applications.
Cortana: Windows 10 introduces Cortana, a Microsoft’s voice handling digital
assistant. The operations are not need to be done by the user, the system itself will do
it for the user, just the user need to spell the instructions for the system.
Xbox App: Windows 10 supports Xbox game streaming which consists of improved
graphics and gaming speed. The app also allows the user to record some victorious
moment of the game by the DVR feature.
Project Spartan Browser; Internet explorer will be replaced by spartan where the new
feature of reading the pdf files is added.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Memory Management: The memory of a system cannot be managed without the
operating system. Various programs and their data execute in the memory at one time,
without the windows 10 the programs may get mixed with them which results in
improper working of the system.
Loading and Execution: Every program gets loaded before it is executed in the
system. Windows 10 allow the program to load in the memory and then help the
program to execute in the system.
Data Security: The most important function of Windows 10 is the data security. It
provides security to the day from various misuse, deletion or modification (Gilad-
Bachrach et al. 2016).
Disk Management: Windows 10 provide disk management facility by managing the
stored folders and the files in the system.
Technical specifications
The top features of windows 10 are as follows:
Return of the Start Menu: Windows 10 return the start menu in the left bottom side of
the screen of system. Whenever a user clicks on the left bottom side of the screen it
displays the pinned, recent and most used applications.
Cortana: Windows 10 introduces Cortana, a Microsoft’s voice handling digital
assistant. The operations are not need to be done by the user, the system itself will do
it for the user, just the user need to spell the instructions for the system.
Xbox App: Windows 10 supports Xbox game streaming which consists of improved
graphics and gaming speed. The app also allows the user to record some victorious
moment of the game by the DVR feature.
Project Spartan Browser; Internet explorer will be replaced by spartan where the new
feature of reading the pdf files is added.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Developed multitasking:
Universal apps
Office apps has touch support
Continuum (Shabana 2018)
Action centre
Unified control panel
Minimum system requirements
The minimum system requirement to install windows 10 in a system are
Processor: Faster 2.5 GHz Dual Core
HDD 320GB
Display: Full HD 1920*1080
GPU: any
Ram: 4 GB
Updates available
Windows 10 contains many updates among which the main updates available are the
Microsoft launcher app: It helps a user to locate the location where he or she
left during the last time of operation
Windows 10 security: It allow the user to access the system by unlocking it by
fingerprint or face unlock if he or she forgets the password of the system.
Addition of #D element in the Microsoft office documents which makes the
documents more decorated and realistic.
Phone app: it allows the user to interact with his or her phone by the phone
app.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Developed multitasking:
Universal apps
Office apps has touch support
Continuum (Shabana 2018)
Action centre
Unified control panel
Minimum system requirements
The minimum system requirement to install windows 10 in a system are
Processor: Faster 2.5 GHz Dual Core
HDD 320GB
Display: Full HD 1920*1080
GPU: any
Ram: 4 GB
Updates available
Windows 10 contains many updates among which the main updates available are the
Microsoft launcher app: It helps a user to locate the location where he or she
left during the last time of operation
Windows 10 security: It allow the user to access the system by unlocking it by
fingerprint or face unlock if he or she forgets the password of the system.
Addition of #D element in the Microsoft office documents which makes the
documents more decorated and realistic.
Phone app: it allows the user to interact with his or her phone by the phone
app.

5
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Night light: it allows the user to work in dim light by emitting warmer lights
which can not harm the eyes of the user.
Licensing
Figure 1: Windows 10 licensing
(Source: Windows 10 Licensing 2019)
Security issues
Some security issues of Windows 10 are:
Mount Manager Vulnerability: In this type of vulnerability the attacker writes a
harmful binary in the disk and then execute the relevant code.
Edge vulnerabilities: In this vulnerability the attacker gets access to the user’s
system.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Night light: it allows the user to work in dim light by emitting warmer lights
which can not harm the eyes of the user.
Licensing
Figure 1: Windows 10 licensing
(Source: Windows 10 Licensing 2019)
Security issues
Some security issues of Windows 10 are:
Mount Manager Vulnerability: In this type of vulnerability the attacker writes a
harmful binary in the disk and then execute the relevant code.
Edge vulnerabilities: In this vulnerability the attacker gets access to the user’s
system.

6
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Graphics Component Vulnerabilities: This vulnerability is related to the various
fonts and the graphics.
Internet Explorer: Here the attacker gets the access to the system rights of the user
Journal vulnerability: This type of vulnerability occurs whenever a user opens a
crafted journal file
Re-direct to SMB (Ullah 2016)
.NET layout escalation of privilege
Font driver vulnerability
Adobe Dreamweaver
Functions
It is the software program utilized to design web pages. Basically, it is a featured
HTML programming and web editor. The program gives WYSIWYG (what you see is what
you get) interface which allow the users to create and modify the web pages. It supports
numerous mark-up languages like XML, CSS, JavaScript and HTML. The features of
Dreamweaver make it a versatile web editor device (DuBois, Schwartz and Cavanaugh
2018).
Technological Specifications
The top specifications of the software program are as follows:
Sync settings
Coding is faster
Streamlined user platform
Source code pro for the code view (Naskova 2016)
Supports for Edge Animate CC
Fluid block framework
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Graphics Component Vulnerabilities: This vulnerability is related to the various
fonts and the graphics.
Internet Explorer: Here the attacker gets the access to the system rights of the user
Journal vulnerability: This type of vulnerability occurs whenever a user opens a
crafted journal file
Re-direct to SMB (Ullah 2016)
.NET layout escalation of privilege
Font driver vulnerability
Adobe Dreamweaver
Functions
It is the software program utilized to design web pages. Basically, it is a featured
HTML programming and web editor. The program gives WYSIWYG (what you see is what
you get) interface which allow the users to create and modify the web pages. It supports
numerous mark-up languages like XML, CSS, JavaScript and HTML. The features of
Dreamweaver make it a versatile web editor device (DuBois, Schwartz and Cavanaugh
2018).
Technological Specifications
The top specifications of the software program are as follows:
Sync settings
Coding is faster
Streamlined user platform
Source code pro for the code view (Naskova 2016)
Supports for Edge Animate CC
Fluid block framework
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Edge cyber fonts
jQuery UI widgets
Modern and latest interface support
System Requirements
The system requirements to install the software program are as follows:
Intel dual Core processor 2GHz or faster
RAM: 2 GB
Display: 1280*1024 along with 16-bit graphics card
Executable in windows 7,8,8.1 or 10
Updates available
Dreamweaver c6 (12.0.1) update of to address the critical problems. This update
focuses on many FTP issues. It improves in the Find and Replace dialog box which is then
followed by the second update of Dreamweaver c6 (12.0.2) which again analyse the same
issue regarding the FTP. The last update of Dreamweaver c6 (12.0.3) focuses on the HidPI
compliance as well as solve the critical errors. The latest update improves the performance of
the code view. This update guarantees the continued compatibility with Adobe PhoneGap
Build operation (Maivald 2018).
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Edge cyber fonts
jQuery UI widgets
Modern and latest interface support
System Requirements
The system requirements to install the software program are as follows:
Intel dual Core processor 2GHz or faster
RAM: 2 GB
Display: 1280*1024 along with 16-bit graphics card
Executable in windows 7,8,8.1 or 10
Updates available
Dreamweaver c6 (12.0.1) update of to address the critical problems. This update
focuses on many FTP issues. It improves in the Find and Replace dialog box which is then
followed by the second update of Dreamweaver c6 (12.0.2) which again analyse the same
issue regarding the FTP. The last update of Dreamweaver c6 (12.0.3) focuses on the HidPI
compliance as well as solve the critical errors. The latest update improves the performance of
the code view. This update guarantees the continued compatibility with Adobe PhoneGap
Build operation (Maivald 2018).

8
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Licensing
Figure 2: Dreamweaver licensing agreement
(Source: Adobe 2019)
Security Issues
The security issues regarding adobe Dreamweaver are as follows:
OS command injection vulnerability
Untrusted search path vulnerability
Cross site scripting vulnerability
SQL injection vulnerability
Licensing vulnerability.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Licensing
Figure 2: Dreamweaver licensing agreement
(Source: Adobe 2019)
Security Issues
The security issues regarding adobe Dreamweaver are as follows:
OS command injection vulnerability
Untrusted search path vulnerability
Cross site scripting vulnerability
SQL injection vulnerability
Licensing vulnerability.

9
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Figure 2: vulnerability of Adobe Dreamweaver
(Source: Adobe Dreamweaver 2019)
SAP:
Main Functions of SAP:
There are various of functionality which is currently provided by the SAP business
software. The main functionality which is provided by the SAP business software are the
materials management, quality management, sales and distribution management, plant
maintenance, warehouse management and customer service. Some additional functionalities
are also provided by this type of system which includes transport management, handling unit
management, batch management and logistics information management.
Technical Specification of SAP:
The main technical specification which is provided by the SAP business software are
the ABAP editor, call view maintenance and data browser.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Figure 2: vulnerability of Adobe Dreamweaver
(Source: Adobe Dreamweaver 2019)
SAP:
Main Functions of SAP:
There are various of functionality which is currently provided by the SAP business
software. The main functionality which is provided by the SAP business software are the
materials management, quality management, sales and distribution management, plant
maintenance, warehouse management and customer service. Some additional functionalities
are also provided by this type of system which includes transport management, handling unit
management, batch management and logistics information management.
Technical Specification of SAP:
The main technical specification which is provided by the SAP business software are
the ABAP editor, call view maintenance and data browser.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Optimising SAP:
For the business requirement it is very much important to optimise the SAP for the
networked system. The SAP business software can be optimised through the following
process:
Manual processes can be identified for changing it to automate by the observation of
productivity gains.
Tribal knowledge need to be transited for formal process and systems.
Network topology need to be created for SAP.
Load balancing can be implemented for optimising SAP in the networked
environment.
WAN optimisation can be done which will actually optimise the SAP to work in the
networked environment.
Minimum System Requirements:
The minimum system requirement for installing the SAP are discussed in the
following section:
CPU: Intel Pentium 4.
Ram: 1 GB
Hard Disk: 32 GB
Ethernet Card
Database Software
DVD Drive
Internet Explorer
Available Updates for the Software:
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Optimising SAP:
For the business requirement it is very much important to optimise the SAP for the
networked system. The SAP business software can be optimised through the following
process:
Manual processes can be identified for changing it to automate by the observation of
productivity gains.
Tribal knowledge need to be transited for formal process and systems.
Network topology need to be created for SAP.
Load balancing can be implemented for optimising SAP in the networked
environment.
WAN optimisation can be done which will actually optimise the SAP to work in the
networked environment.
Minimum System Requirements:
The minimum system requirement for installing the SAP are discussed in the
following section:
CPU: Intel Pentium 4.
Ram: 1 GB
Hard Disk: 32 GB
Ethernet Card
Database Software
DVD Drive
Internet Explorer
Available Updates for the Software:

11
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
There are various of software updates are available for the SAP business software.
SAP release the software updates based on the requirement of the system. There can be also
requirement of the users due to which software updates are pushed to the existing SAP
systems. Current available software updates can be seen and can be downloaded through the
software update manager of SAP.
Licencing of SAP:
For the SAP licencing there are total four types of licencing which need to be done
which are the general licence, cloud application, native HANA solution and S/4 HANA
solution.
Security issues with the SAP:
The main risks which is related with the security of SAP are discussed in the
following section.
Improper type of custom objective control.
Security vulnerabilities in infrastructure.
Ineffective type of vendor and contractor management process.
Ineffective type of segregation of duties.
Wire shark:
Main Functionality of Wireshark:
The Wireshark is an open source type of packet analyser. The main functionality that
is provided by the wireshark are the troubleshooting of the network, development of
communication and software protocol, it is also used for educational purpose.
Technical Specification of the Software:
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
There are various of software updates are available for the SAP business software.
SAP release the software updates based on the requirement of the system. There can be also
requirement of the users due to which software updates are pushed to the existing SAP
systems. Current available software updates can be seen and can be downloaded through the
software update manager of SAP.
Licencing of SAP:
For the SAP licencing there are total four types of licencing which need to be done
which are the general licence, cloud application, native HANA solution and S/4 HANA
solution.
Security issues with the SAP:
The main risks which is related with the security of SAP are discussed in the
following section.
Improper type of custom objective control.
Security vulnerabilities in infrastructure.
Ineffective type of vendor and contractor management process.
Ineffective type of segregation of duties.
Wire shark:
Main Functionality of Wireshark:
The Wireshark is an open source type of packet analyser. The main functionality that
is provided by the wireshark are the troubleshooting of the network, development of
communication and software protocol, it is also used for educational purpose.
Technical Specification of the Software:

12
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
The main technical specification of the software are that it is cross platform, it is
having terminal based interface and graphical user interface and it is capable of using the
pcap.
Configuration of the Software for optimising it to networked system:
To make the wireshark optimised to the network system the main configuration which
are needed in this are the CLI. The CLI is used for configuration of the wireshark that must
be featured and need to be executed only from the EXEC mode. All the actions that occurs
within the configuration submode are handled at the mode of EXEC.
Minimum System Requirement for Wireshark:
CPU: AMD 64 bit Athlon Processor
Ram: 512 MB
Hard Disk: 1 GB
Ethernet Card
Database Software
DVD Drive
Internet Explorer
Available Updates for Wireshark:
Currently there are various of updates are available for the wireshark which can be
gained by directly from the online repository of wireshark.
Licencing requirement for the Wireshark:
The wireshark is an open source type of software which can be used by the users
without paying any type of licencing fees. Through this demo version can be gained. The full
version of the wireshark is licenced under general public licence version 2.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
The main technical specification of the software are that it is cross platform, it is
having terminal based interface and graphical user interface and it is capable of using the
pcap.
Configuration of the Software for optimising it to networked system:
To make the wireshark optimised to the network system the main configuration which
are needed in this are the CLI. The CLI is used for configuration of the wireshark that must
be featured and need to be executed only from the EXEC mode. All the actions that occurs
within the configuration submode are handled at the mode of EXEC.
Minimum System Requirement for Wireshark:
CPU: AMD 64 bit Athlon Processor
Ram: 512 MB
Hard Disk: 1 GB
Ethernet Card
Database Software
DVD Drive
Internet Explorer
Available Updates for Wireshark:
Currently there are various of updates are available for the wireshark which can be
gained by directly from the online repository of wireshark.
Licencing requirement for the Wireshark:
The wireshark is an open source type of software which can be used by the users
without paying any type of licencing fees. Through this demo version can be gained. The full
version of the wireshark is licenced under general public licence version 2.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Known Security issues in the Wireshark:
The wireshark is an open source type of software which is used for monitoring of the
network. As wireshark is an open source software anyone can download and use this software
and through this software peoples can monitor the network of other users. Open port of other
users can be seen through the wireshark which is creating security related issues for the other
users which is a vital security issue in this case.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Known Security issues in the Wireshark:
The wireshark is an open source type of software which is used for monitoring of the
network. As wireshark is an open source software anyone can download and use this software
and through this software peoples can monitor the network of other users. Open port of other
users can be seen through the wireshark which is creating security related issues for the other
users which is a vital security issue in this case.

14
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
References
Adobe (2019). Buy Adobe Dreamweaver | Website and web design software. [online]
Adobe.com.
Adobe Dreamweaver (2019). Adobe Dreamweaver : List of security vulnerabilities. [online]
Cvedetails.com.
Cordell, A. and Thompson, I., 2019. The Procurement Models Handbook. Routledge.
DuBois, M., Schwartz, R. and Cavanaugh, K., 2018. Learn Adobe Dreamweaver CC for Web
Authoring: Adobe Certified Associate Exam Preparation. Peachpit Press.
Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M. and Wernsing, J., 2016,
June. Cryptonets: Applying neural networks to encrypted data with high throughput and
accuracy. In International Conference on Machine Learning (pp. 201-210).
Grandia, J., Steijn, B. and Kuipers, B., 2015. It is not easy being green: increasing sustainable
public procurement behaviour. Innovation: The European Journal of Social Science Research,
28(3), pp.243-260.
Hughes, R.T., Cox, K. and Akhir, E.P., 2016. Modelling the alignment of information
systems and business strategy: an example from sustainable procurement. In the 24th
International Software Quality Management (SQM) and INSPIRE Conference.
Bournemouth: SQM/INSPIRE.
Maivald, J., 2018. Adobe Dreamweaver CC Classroom in a Book (2018 release). Adobe
Press.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
References
Adobe (2019). Buy Adobe Dreamweaver | Website and web design software. [online]
Adobe.com.
Adobe Dreamweaver (2019). Adobe Dreamweaver : List of security vulnerabilities. [online]
Cvedetails.com.
Cordell, A. and Thompson, I., 2019. The Procurement Models Handbook. Routledge.
DuBois, M., Schwartz, R. and Cavanaugh, K., 2018. Learn Adobe Dreamweaver CC for Web
Authoring: Adobe Certified Associate Exam Preparation. Peachpit Press.
Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M. and Wernsing, J., 2016,
June. Cryptonets: Applying neural networks to encrypted data with high throughput and
accuracy. In International Conference on Machine Learning (pp. 201-210).
Grandia, J., Steijn, B. and Kuipers, B., 2015. It is not easy being green: increasing sustainable
public procurement behaviour. Innovation: The European Journal of Social Science Research,
28(3), pp.243-260.
Hughes, R.T., Cox, K. and Akhir, E.P., 2016. Modelling the alignment of information
systems and business strategy: an example from sustainable procurement. In the 24th
International Software Quality Management (SQM) and INSPIRE Conference.
Bournemouth: SQM/INSPIRE.
Maivald, J., 2018. Adobe Dreamweaver CC Classroom in a Book (2018 release). Adobe
Press.

15
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Naskova, J., 2016, December. Dreamweaver on the cloud: Web designers' perspectives. In
2016 10th International Conference on Software, Knowledge, Information Management &
Applications (SKIMA) (pp. 267-273). IEEE.
Shabana, A.A., 2018. Computational continuum mechanics. John Wiley & Sons.
Ullah, I., 2016. Detecting Lateral Movement Attacks through SMB using BRO (Master's
thesis, University of Twente).
Windows 10 Licensing (2019). Windows 10 Licensing | Microsoft Volume Licensing.
[online] Microsoft.com.
Zandvliet, L. and Anderson, M., 2017. Getting it right: Making corporate-community
relations work. Routledge.
ICTNWK411 DEPLOY SOFTWARE TO NETWORKED COMPUTERS
Naskova, J., 2016, December. Dreamweaver on the cloud: Web designers' perspectives. In
2016 10th International Conference on Software, Knowledge, Information Management &
Applications (SKIMA) (pp. 267-273). IEEE.
Shabana, A.A., 2018. Computational continuum mechanics. John Wiley & Sons.
Ullah, I., 2016. Detecting Lateral Movement Attacks through SMB using BRO (Master's
thesis, University of Twente).
Windows 10 Licensing (2019). Windows 10 Licensing | Microsoft Volume Licensing.
[online] Microsoft.com.
Zandvliet, L. and Anderson, M., 2017. Getting it right: Making corporate-community
relations work. Routledge.
1 out of 16
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.