Assignment:
Q1. Discuss the differences between ananomaly-based and a misuse-based detection model?Which would you use to protect a corporate network of 10,000 users?Why would you choose that model?
Q2. Pick three technologies discussed in this chapter and describe how you deploy them to protect a small business network.
Q3. Describe the protection each technology provides?
Your answer must be, typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format.