Create a table or web diagram organizing the following specific technologies (as discussed in your textbook) in the order they would appear in an IT network connected to the internet:
Vulnerability scanners
Firewalls
Firewall analytical tools
Intrusion detection
Intrusion prevention
Dial-up and networking analysis tools
Port scanners
Packet sniffers
Encryption
Trap & Trace
Wireless security tools
In a 500 word minimum essay, write an explanation of the roles each of the technologies play in information security. Be sure to cite all sources using APA format.