Perform a scan of your home and business network

Assignment Help Computer Network Security
Reference no: EM131706458

Assignment

The purpose of this assignment is to familiarize students with a few networking concepts that are frequently utilized by IT professionals.

1. Download/install the Fing application on your mobile device, smartphone, or tablet. If you do not have any of these devices, use Google to identify and install a similar application on your computer. Perform a scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences. Use the application to determine additional information on the results.

2. Download and install the NMAP application on your PC. Use NMAP to scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences. Use the application to determine additional information on the results.

Research and write a paper (250-500 words) on the reasons why these applications might be valuable in troubleshooting and securing network(s). Provide details on your results from Steps 1 and 2 and how those results can specifically be used to troubleshoot and secure your network in the future.

Be sure to cite your research, as well as the tools you used to perform actions related to the research.

Prepare this assignment according to the guidelines found in the GCU Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Reference no: EM131706458

Questions Cloud

What are the characteristics of a perfectly competitive : What are the characteristics of a perfectly competitive market? Explain why the market for Microsoft stock is perfectly competitive.
What dangers or discomforts might the unethical action cause : What is the inappropriate action(s)? What dangers or discomforts might the unethical action cause? Is there a parallel in the physical world to this scenario?
Describe your global markeing strategy : Describe your global markeing strategy and how, if at all, you would modify the product feature or price by country in your market selection.
Review case based on video surveillance company : Citywatcher.com, a video surveillance company, has issued a work rule requiring its employees to have radio frequency identification chips embedded.
Perform a scan of your home and business network : Perform a scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences.
Market-based approaches to reducing air pollution : The government is thinking about market-based approaches to reducing air pollution such as corrective taxes, command and control, and tradeable pollution.
Why immune regulation is important give example : What are primary lymphoid organs and secondary lymphoid organs and their functions? Why immune regulation is important? Give example
Does the ad appeal to your emotions : What motivations does the ad use to grab and hold attention? Does the ad appeal to your emotions? Why or why not?
What unfair labor practices has lawson committed : When the UFCW filed a representation petition with the NLRB, seeking an election, employees were told that the stores would close if they voted in the union.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Network engineer, you are presented

As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choos..

  Strategies and recommendations to the cio

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization and draft a one page Executive Summary that details your strategies and recommendations to t..

  What does kleopatra allow you to do once it is installed

What does Kleopatra allow you to do once it is installed? What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?

  What types of risks or vulnerabilities could be transferred

What types of risks or vulnerabilities could be transferred from a supplier and/or imposed upon a purchaser of cyber security related products and/or services?

  How will cross-forest trusts be implemented

CMIT-371 Windows Network ServicesProposal- How will Forest Functional Levels be implemented? How will cross-forest trusts be implemented? How will replication be handled? Read-Only Domain Controllers - how and where will they be used?

  Computer security for your company

Present a brief summary of the arguments for and against outsourcing computer security for your company. Select two firms that offer computer security outsourcing services, and compare them and their services. Include several pros and cons of each

  Project - prepare a local it security policy

Project: Prepare a Local IT Security Policy- In Project 1, you developed an outline for an enterprise level IT security policy. In this project, you will write an IT security policy which is more limited in scope - a local IT security policy

  How to find anti-virus and firewall sw on your computer

How to find anti-virus and/or Firewall SW on your computer. Discussion on how to remove unwanted Virus and Malware?

  Describe the steps necessary to restore operations

A disgruntled employee takes a critical server home, sneaking it out afterhours. For each of the scenarios (a-e), describe the steps necessary to restore operations. Indicate whether law enforcement would be involved.

  Are firewalls the total solution to deny access to systems

Are firewalls the total solution to deny access to systems? Give examples to support your answer. What is the role of application gateways and circuit-level gateways?

  Proposed changes to the tax code

A major part of U.S. Fiscal Policy is taxation. Taxation is the main source of revenue for the government. The tax code has been modified and grown more complex over the years. Proposed changes to the tax code continue to be debated as the country ..

  Project management to suppress the dissemination

The general method is to encourage timely communication of news to project stakeholders. However, can you envisage conditions where it may be necessary,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd