Discussion
1) Define a packet analyzer and describe its use.
2) List commonly used packet analyzers (beyond WireShark).
3) List best practices for analyzing packets.
4) Describe uses (good and bad, ie. hacker) of a packetanalyzer.
5) Discuss ways you would protect your own network data from being analyzed.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.