1. Security Plan and Policy
What is the difference between a security plan and a security policy? How these do relates to each other?
2. Trade Off for Security
Network design requires give-and-take to achieve business goals. What four trade offs would need to be made to achieve maximum security of the network?
3. Top 10 Attacks
From the list below, pick the four most significant attacks you will consider in protecting the WWTC network security design. Explain how the attacks work and how you would mitigate them.
Medium Network Campus Top 10 Attacks
Ransomware
Advanced Persistent Threat
Virus/worm/Trojan horse
Rogue devices
Sniffer
Man-in-the-middle (MITM)
War dialing/driving
DNS Rebinding
ARP redirection/spoofing
SQL Injection
Buffer overflow
Attachment is included
4. Network Security Breach/Hack
Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network, but then penetrated farther into the network, resulting in severe damage. Write two or three paragraphs about what you found.