Assignment
RESPOND TO EACH OF THESE IN 3 PARAGRAPHS AT LEAST.
1. Identify the types of threats that could potentially attack a network.
2. Explain the importance of private non-routable IPS (RFC 1918)
3. Describe signature analysis and how it relates to network traffic.
4. Explain the importance of using ACLs.
5. Discuss the importance of nonrepudiation.
6. Identify some of the vulnerabilities that affect cryptographic systems
7. Discuss ways to secure a wireless network
8. Describe the potential threats to a wireless network.
9. Compare and contrast anomaly detection and signature detection in reference to network-based intrusion detection and prevention systems.
10. Explain why a hybrid approach to intrusion detection and prevention provides greater security
PLEASE READ THIS.IT IS VERY IMPORTANT
Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points. You must discuss the topic using your own words first. Using your own words indicate you understand the topic of discussions. Secondly, you must cite your sources in-text. This is necessary to justify your points. Sources from several sources showed good research abilities. Lastly, you must provide references at the bottom of your post. A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this. You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.