dq1: This week you will examine WireShark a wellused networkpacket analyzer. For this discussion: Define a packet analyzer

dq1: This week you will examine WireShark, a well-used network-packet analyzer. For this discussion:
Define a packet analyzer and describe its use
List commonly used packet analyzers (beyond WireShark)
List best practices for analyzing packets
Describe uses (good and bad, ie. hacker) of a packetanalyzer
Discuss ways you would protect your own network data from being analyzed
dq2:
One of the first lines of security defense that companies (and individuals) should perform is to enable a firewall. Today, most routers include a firewall, most personal-computer operating systems provide a firewall, and their are a variety of network (hardware and software) firewalls available. For this discussion:
Define the term firewall
Discuss the goal(s) of a firewall
Describe different types of firewalls (router, server, personal computer, network) and when users should use each
List several commonly available (open source) firewalls
Describe best practices for using a firewall
Make sure you post your primary response and then respond
dq3:
One of the ways businesses provide secure access to their network (or a subset of their network) to remote (or mobile) users is to use virtual private networks (VPNs). VPNs allow users to connect securely (over an encrypted link) to a network. For this discussion:
Define the term virtual private network
Discuss the goal(s) of a VPN
Describe different types of VPNs (hardware or software based)
Discuss how the use of a VPN may support BYOD (bring your own device)
List several commonly available (open source) VPNs
Describe best practices for using a VPN
dq4:
Security is a very complex process, affecting applications, networks, databases, facilities, and more. This week we will examine security considerations. Specifically, I am looking for you to provide simple best practices all users (and companies) should follow. Within your post:
Network Security
Provide 5 to 10 network-security best practices
Mobile Security
Provide 5 mobile-computing-security best practices
Facilities
Provide 5 to 10 physical security best practices

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Connect with a professional writer in 5 simple steps

Please provide as many details about your writing struggle as possible

Academic level of your paper

Type of Paper

When is it due?

How many pages is this assigment?

Place Order