Create a table or web diagram organizing the following specific technologies (as discussed in your textbook) in the order they would appear in an IT network connected to the internet:
- Vulnerability scanners
- Firewalls
- Firewall analytical tools
- Intrusion detection
- Intrusion prevention
- Dial-up and networking analysis tools
- Port scanners
- Packet sniffers
- Encryption
- Trap & Trace
- Wireless security tools
In a 500 word minimum essay, write an explanation of the roles each of the technologies play in information security. Be sure to cite all sources using APA format.