Week 5 - Homework Assignment
Imagine that you work at a small company with 75 employees in a modern office building. Some of the
employees are eager for the flexibility of a WLAN, especially since they move from offices to conference
rooms often and use t
Copper wires, fiber optics, and wireless are commonly used at the physical
level in many networks. Give a brief description of the advantages of each.
Also, describe problems that might arise when using these media.
Copper wires, fiber- cables, and wirele
Week 8 Assignments - NET SEC
Theme for the week: Network Intrusion Detection and Prevention
This week, we explore the use of different types of IDPS systems, and
explains the components of an IDPS. The implementation of IDPS systems is
discussed, such as
Week 9 Assignments NET SEC
Theme for the week: Firewall Concepts
This week introduces you to software and hardware firewall appliances, and
discusses how these products differ from each other. You will learn how
firewalls can be used to filter traffic on
CIS 406 Information Security
Catalog description: This course is designed to provide an introduction to information security.
Current trends in information security will be explored. Students will be introduced to sources of
Week 8 Written Assignment
IBM Proventia Network Intrusion Prevention System
IBM Proventia Network Intrusion Prevention System (IPS) GX5108 is an intrusion
prevention system that can be added to an existing network or added as h
Week 1 Assignments
Theme for the week: Network Security Fundamentals
Theme for the week: Introduction to Network Security
Computer security involves implementing measures to secure a single
computer. Network security involves protecting all the resources
Week 2&3 Written Assignment
Answer All Topics Below
1. For the OSI seven-layer model, explain in your own words the function of each layer and list
examples of protocols for each of the layers. This can
Week 5 Assignments - NET SEC
Theme for the week: Routing Fundamentals
Routers are among the most common network infrastructure devices
found on and around the Internet. They are an important target for
malicious agents, since they handle all types of netw
Week 4 Written Assignment
Pick two topics
4.) Discuss the four different types of suspicious traffic signatures:
1.) Informational Suspicious traffic signatures that fall into the informational category
are not necessarily mali
Week 1 Assignments
Theme for the Week - Introduction to
Describe the challenges of securing information.
Define information security.
Identify types of attackers that are common today.
Describe the five basic principles of de
Weeks 6 & 7 Assignments - NET SEC
Theme for the week: Wireless Networking & Security
The next two weeks is about wireless networking. It includes a basic
introduction to wireless fundamentals. You will learn about the
characteristics of wireless network t
Week 12 Assignments - NET SEC
Theme for the week: Security Management and Course Wrap-up
This week, you will learn how to further secure a network by better
utilization of network logging information. You will see about network
audits and what an audit mi
For the steps in the Interpersonal project, I want you to place the skill you
chose in step 1 at the top of the essay.
Then you start your essay here. It should be 12 pt font, Times New Roman,
double spaced with 1 margi
Week 6&7 Written Assignment
Answer All the questions Below
1. Explain how RF wireless transmissions work for wireless networks. Note some common
RF bands and their uses.
Almost all standard wireless access points use RF waves f
Week 10 Assignments - NET SEC
Theme for the week: Firewall Design and Management
This week explores the use of different types of firewall configurations, and how a firewall might be
placed within a network. The advantages and disadvantages of proxy serve
Review of 2012 Data Breach Investigations Report
The completed report of 2012 list the closed investigations of 2011. Some of the events
that happened in this time frame are not documented in this investigation b
Week 11 Written Assignment
NIST SP800-114: Securing External Devices for Telework and Remote Access
1. Explain why and how teleworkers need to secure PCs and devices used to
remotely connect to a network.
2. How do yo
Special Publication 800-114
Users Guide to Securing
External Devices for Telework
and Remote Access
Recommendations of the National Institute
of Standards and Technology
NIST Special Publication 800-114
Users Guide to Secu
Week 11 Assignments NET SEC
Theme for the week: Remote Access and VPNs
This week we evaluate various methods for remotely accessing a network or
The old way to allow a remote user to access an internal network is to equip
both the client
Week 4 NET SEC
Theme for the week: Network Traffic Signatures
This week we continue looking at network security fundamentals including
basic methods for blocking unwanted network traffic.
In this chapter, you will learn about how to identify vulnerabiliti
Weeks 2 & 3 Assignments NET SEC
Theme for the week: TCP/IP & The Internet
Theme for the week: Network protocols and best practices.
For the next two weeks, we go in depth on networking technologies,
tools, and techniques. This includes understanding netwo
What is an IP Address? What is it used for?
According to the text IP is probably one of the oldest networking standards, developed for ARPANET.
Now it is being used on the internet which is one of the most commonly used network protocols. IP
These are not fatuous questions, as any follower of the literature on internet crime and security
can attest. There have been many examples of "identity theft" using information provided online
by individuals - birthdates, driving license numbers, credit
Select a journal article from the BU online library that is related to a networking concept from the first three
weeks of this course. Be sure it is a journal article. Ask if you are not sure about whether or not the source is a
journal (I use the ProQues
Wi-Fi eyes better wireless LAN security
I choose to write about LANs, and I picked the topic from the InfoWorld magazine. The topic of
my article is Wi-Fi eyes better wireless LAN security. The article was published on the 30th of
October of 2002 by an au
If your boss says, "Get me some prices on switches," then what questions would you need
to ask and what information would you need to pin down before starting to look at
According to http:/compnetworking.about.com/od/hardwarenetworkgear/g/bldef_s
Week 2 Home Work Assignment.
For this assignment I will be investigating the two-tier architecture.
According to the text the two-tier architecture uses only two sets of computers one
set for the clients and the other set for the servers. In a two-tier ar