Two network security software tools

Assignment Help Basic Computer Science
Reference no: EM13936839

You are required to choose TWO network security software tools and conduct a comparison of them. The two tools must satisfy the following criteria:

a. They must be of a similar type. Otherwise, a comparison would be unfair and of limited purpose.
b. They must be of a type listed on page 22. Other types are not acceptable unless explicitly agreed by the module leader.
c. They must be agreed with your module leader. The means of reaching this agreement are described below. The number of students comparing the same two tools will be limited to a maximum of 5, on a first-come, first-serve basis. Furthermore, you should ensure that there is no significant overlap between this coursework and the work that you are undertaking for your final year project. If you are in any doubt, please discuss your choice of tools with the module leader, prior to the deadline specified below.
d. You must be capable of demonstrating "Practical: Configuration of a network security tool under time-constrained, (20 minutes) laboratory conditions"your tools to your tutor(s) using the hardware/software available in room KD.2.15.

You must submit a report of NOT more than 2,000 words (excluding the assignment cover sheet, title page, screenshots and reference list) which contains the following:

1. A brief description of the two tools that you have chosen to compare.
2. A brief explanation of the criteria that you used to compare the two tools.
3. A brief summary of the outcome of the comparison based on the criteria that you have selected. The outcome should be presented in the form of a table with three columns; Column 1 - the evaluation criteria, Column 2 - an assessment of tool 1 against the criteria and Column 3

- an assessment of tool 2 against the criteria. Your summary should also include an overall assessment i.e. which of the two tools would you recommend and why.
4. A reference list indicating the sources of information that you have used i) to develop your understanding of the purpose and function of your chosen tools and ii) to select your evaluation criteria.

Please avoid the inclusion of large numbers of screenshots. Include only those that are necessary to illustrate the application of your evaluation criteria.

Both the submission and the assessment of this coursework will be entirely electronic. You should therefore submit your assignment via the Turnitin link on Moodle website for this module. You will NOT be able to submit a printed copy of your work to the ACE Reception.

You will receive assignment feedback via Turnitin. Details of how you can obtain your feedback will be provided shortly after the assignment deadline.

Assessment criteria

By Friday 7th November 2014, you need to have obtained your module leader's agreement to your chosen tools. You should post details of your proposed tools in the appropriate discussion forum on Moodle You should include with the details confirmation that there is no significant overlap between this coursework and your final year project. Your module leader will indicate, via Moodle, whether or not your choice is acceptable. You will not be able to change your choice after the above date so it is essential that you start your investigation/planning as soon as possible.

Reference no: EM13936839

Questions Cloud

Prepare summary journal entries for april : Prepare summary journal entries for April (without disposing of under- or overallocated conversion costs). Assume no direct materials variances.
What factors should sido consider before choosing a supplier : Which supplier should Sido choose? Show all calculations. What other factors should Sido consider before choosing a supplier?
Graded for technical content and from a grammar perspective : Write about Wal-Mart. It will be graded for technical content and from a grammar perspective. The paper should be approximately 2,000 words in length. References need to be cited throughout the paper and in the reference section
Is this a strand of dna or rna : If DNA and a base were inserted at the beginning of the 5' end of the molecule, how would that affect protein synthesis and the resultant protein? (Hint: think about the code), What would happen to the reading frame if three bases were inserted/del..
Two network security software tools : They must be of a type listed on page 22. Other types are not acceptable unless explicitly agreed by the module leader. c. They must be agreed with your module leader. The means of reaching this agreement are described below.
Explain the importance of pointers : Assuming an array has to be sorted, inserting a new element required shifting, in the worst case, n elements, where n is the number of elements in the array, i.e.:
What are the criteria for good primers in a pcr reaction : What are the criteria for "good" primers in a PCR reaction? Describe how you would use site-directed mutagenesis to change a BamHI restriction site into an EcoRI site.
Factors that influence buying behavior : Factors that influence buying behavior - Cultural, social, personal and psychological. Include consumers buying decision process.
Enthusiasm and perseverance in gaining new skills : Enthusiasm and perseverance in gaining new skills and knowledge over the years, makes me a suitable candidate for astrophysics. I look forward to the challenges and the moment when most of the things

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Writing an instruction sequence to swap

Write an instruction sequence to swap the 16-bit word stored at $1000 $1001 with the 16-bit word stored at $1100 - $1101.

  How many inherited classes are defined in the code

1. Which function(s) is/are being overloaded on the code? (Check all that apply) *  void sort(int A[], int size)  bool testIfSorted(int A[], int size)  long getNumCmps()

  Implementation of computer systems in organizations

As you explore the six areas of implementation (coding, testing, installation, documentation, training, and support plan creation) reflect on how each is integrated with one another.

  Two major issues involved with acquiring systems

Discuss two major issues involved with acquiring systems and two major issues commonly faced when maintaining them. Address how each can be minimized or overcome.

  Find total average time to satisfy request of platter disk

Determine the average seek time? Determine the average rotational latency? Determine the transfer time for a sector? Determine the total average time to satisfy a request?

  Determine what fraction of processor time is consumed

Consider a system employing interrupt-driven I/O for a particular device that transfers data at an average of 8 KB/s on a continuous basis.

  Names and numbers of london-based suppliers

Give the relational algebra expression for the following English queries. 1. Get the supplier# who supply all the blue parts

  What properties are needed in a secure hash function h

What properties are needed in a secure hash function H?

  Input and output devices of a computer

Write a one page paper in APA format on the input and output devices of a computer

  What networking-communications changes were in past decades

What networking and communications changes were introduced in the past decade (2000s), and what were their implications?

  What are some additional performance metrics of interest

Suppose you have two systems. System #1 processes jobs at rate 100 jobs/sec and system #2 at a rate 150 jobs/sec. What is the speed-up and relative change of system #1 with respect to system #2?

  Http server may initiate interaction client true or false

In HTTP, a server may initiate an interaction with the client. a)Answer True b)False

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd