Usetutoringspotscode to get 8% OFF on your first order!

Current Trends and Projects in Computer Networks and Security

1. Security Plan and Policy

What is the difference between a security plan and a security policy? How these do relates to each other?

2. Trade Off for Security

Network design requires give-and-take to achieve business goals. What four trade offs would need to be made to achieve maximum security of the network?

3. Top 10 Attacks

From the list below, pick the four most significant attacks you will consider in protecting the WWTC network security design. Explain how the attacks work and how you would mitigate them.

Medium Network Campus Top 10 Attacks

Ransomware
Advanced Persistent Threat
Virus/worm/Trojan horse
Rogue devices
Sniffer
Man-in-the-middle (MITM)
War dialing/driving
DNS Rebinding
ARP redirection/spoofing
SQL Injection
Buffer overflow

Attachment is included

4. Network Security Breach/Hack

Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network, but then penetrated farther into the network, resulting in severe damage. Write two or three paragraphs about what you found.

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes