Reference no: EM131991418
Identifying Network Threats using Network Security Tools
Purpose of the assessment (with ULO Mapping) The objective of this assignment is to identify network threats using network security tools.
The purpose of the assignment as per Unit Learning Outcomes:
Explain the major methodologies for secure networks and the threats they address
Identify and report network threats, select and implement appropriate countermeasures for network security
Assignment Description
It is important for networking professionals to stay abreast of new security threats and learn how to address them. In this assignment, your task is to identify and evaluate network security threats that relates to network monitoring. You may, for example, investigate the network in the Institute, at your home or of the Internet by using any network security tool.
Use any TWO open source network monitoring and analysis tool such as GFI LanGuard, Nagios, PRTG, Nmap, Metasploit, Kismet, TCPdump, Open VAS etc. Compare results after scanning your network and discuss on the threats that these tools could be used for network monitoring. Also provide an appropriate mitigation strategies for the selected threats and attacks.
Amount of learning acquired rise as a result
: If the quality of instruction rises from 8 to 10, by how much will the amount of learning acquired rise as a result?
|
Briefly summarize the documentary
: Briefly summarize the documentary. What evidence is used to support the theories/arguments put forth? In other words, discuss the arguments put forth using.
|
Monopolistic competition and oligopoly
: Monopolistic Competition and Oligopoly (gaming systems) we have three major competitors Nintendo, Sony, and Microsoft,
|
How does the idea of tradeoff relate to opportunity cost
: How does the idea of tradeoff relate to opportunity cost. Is there a difference between monetary and non-monetary opportunity costs
|
Identifying network threats using network security tools
: BN203 - - Identifying Network Threats using Network Security Tools - dentify and report network threats, select and implement appropriate countermeasures
|
Identify the costs of having unemployment levels
: Identify the costs of having unemployment levels that are either too high or too low.
|
Heckscher-ohlin theory
: According to the Heckscher-Ohlin theory, two countries that have the same production technologies for the various products that they produce are unlikely
|
Examine basic components of marketing plan
: Examine basic components of marketing plan, including pricing models, promotion, and sales management.
|
Ancient female rulers
: Compare the Tang Empress Wu Zetian (also known as Empress Wu or as Wu Zhao; ruled China around 690-705 AD) with either the Pharaoh Cleopatra
|