Homework
For your final step, synthesize the previous steps and labs to summarize the major findings and from this project.
Specifically, prepare a technical report that summarizes your findings. Include all of the following elements:
• The strengths and limitations associated with limiting access of web pages through the use of firewalls.
• A detailed description of how tunneling through firewall via SSH worked and how the process could be used protect a private subnet. Describe the implications of using a jump box for access to the private subnet. Cover concerns such as key storage, creation, and rotation at scale for a large organization.
• TLS communication challenges and results from your TLS 1.3 Java client-server implementation. Describe how this functionality could be used to support an IoT application with hundreds of thousands of remote sensor devices connecting across a distributed network.
• A discussion of major threats to WLANs and how each can be mitigated. Provide security monitoring best practices and describe suitable approaches to protecting a WLAN.
Delve further into these topics by conducting research beyond the classroom readings and lab exercises to gain further insight and enhance your report.
Naturally, I expect your report will include a title page, table of contents, list of tables and figures (if applicable), and a list of references. Organize the content into sections, with clear, meaningful headings.
Format your homework according to the give formatting requirements:
• The answer must be using Times New Roman font (size 12), double spaced, and typed, with one-inch margins on all sides.
• The response also includes a cover page containing the student's name, the title of the homework, the course title, and the date. The cover page is not included in the required page length.
• Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.
References
• Joint Task Force Transformation Initiative. (2015, January 22). "SC-7 Boundary Protection," from Security and Privacy Controls for Federal Information Systems and Organizations.