SlideShare a Scribd company logo
1 of 2
This final assignment will be a departure from the three
previous Analysis Assignments. It will require you to research,
develop, and write an APA formatted research paper on
Computer Network Security Issues. Using the following steps
will guide you through the process. 1) You have the basic
knowledge of network hardware, software, and operational
theory from your work during this course thus far, which will be
utilized in this research effort. 2) While some students may
have considerable knowledge of cybersecurity issues, we are
assuming you do not. As a result, the eBook Network Security
A Practical Approach which is posted should be studied and
utilized as your security issues resource, along with additional
Internet research as you desire. The eBook was published in
2006, but the fundamental security issues described in it have
not changed. 3) The following research questions can be used as
a guide or outline for the development of your research paper:
a. Discuss the types/sources categories of security threats that
can damage or destroy network operations and ultimately the
data and information. Consider both cyber threats as well as
physical threats (building/server security, fire or similar
catastrophic event, personnel access to equipment, et al). b.
Consider and discuss the types of cyber attacks that can be
leveraged against network hardware, i.e. keystroke loggers,
attacks on router and switches, network media, and other
vulnerable network hardware. c. Consider and discuss the types
of cyber-attacks that are leveraged through network topologies,
i.e. types of networks and remote access. Also, discuss what
parts of the OSI network model are most vulnerable to attack. d.
Research and discuss the following types of cyber-attacks that
can penetrate network operations, with extensive detail on the
inner-workings of the network hardware and digital technology
involved: TCP spoofing, denial of service attacks, wireless
network attacks, and Internet of Things (IoT) security issues. e.
Briefly discuss the role of the human factor (users following
security procedures such as passwords and falling for phishing
attacks) in network security. f. Detail the five most important
factors or potential issues you should always monitor to
maintain a secure network. g. Finally, draw conclusions and
summarize the key points from your literature research. 4) The
document should be prepared following these guidelines: a. 10
pages, including a cover page and reference list, double spaced
or 2800 words minimum. b. APA format should be followed
with at least 8 references (see the APA format tips PPT). c.
Diagrams and graphics are encouraged but not mandatory. d.
The document should be well organized and professionally
written, carefully proofread, and spell-checked and contain an
introduction and conclusion paragraphs. e. Heading throughout
is recommended to enhance the readability and interest of the
reader. 5) The document may be submitted up to or on the last
day of the term for this course, Sunday, May 10, 2020, at 11:59
pm EST.

More Related Content

Similar to This final assignment will be a departure from the three previous.docx

Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comGeorgeDixon100
 
Project Deliverable 5 Network Infrastructure and SecurityThis
Project Deliverable 5 Network Infrastructure and SecurityThisProject Deliverable 5 Network Infrastructure and SecurityThis
Project Deliverable 5 Network Infrastructure and SecurityThisdavieec5f
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersPROBOTEK
 
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docxSubject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docxdarwinming1
 
Project Deliverable 5 Network Infrastructure and SecurityDu
Project Deliverable 5 Network Infrastructure and SecurityDuProject Deliverable 5 Network Infrastructure and SecurityDu
Project Deliverable 5 Network Infrastructure and SecurityDudavieec5f
 
Project Deliverable 5 Network Infrastructure and SecurityDue We.docx
Project Deliverable 5 Network Infrastructure and SecurityDue We.docxProject Deliverable 5 Network Infrastructure and SecurityDue We.docx
Project Deliverable 5 Network Infrastructure and SecurityDue We.docxdenneymargareta
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutletPatmorez
 
For each question provide a one to two sentences per questi.pdf
For each question provide a one to two sentences per questi.pdfFor each question provide a one to two sentences per questi.pdf
For each question provide a one to two sentences per questi.pdfablazeaepl
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 

Similar to This final assignment will be a departure from the three previous.docx (10)

Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Project Deliverable 5 Network Infrastructure and SecurityThis
Project Deliverable 5 Network Infrastructure and SecurityThisProject Deliverable 5 Network Infrastructure and SecurityThis
Project Deliverable 5 Network Infrastructure and SecurityThis
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
 
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docxSubject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
 
Project Deliverable 5 Network Infrastructure and SecurityDu
Project Deliverable 5 Network Infrastructure and SecurityDuProject Deliverable 5 Network Infrastructure and SecurityDu
Project Deliverable 5 Network Infrastructure and SecurityDu
 
Project Deliverable 5 Network Infrastructure and SecurityDue We.docx
Project Deliverable 5 Network Infrastructure and SecurityDue We.docxProject Deliverable 5 Network Infrastructure and SecurityDue We.docx
Project Deliverable 5 Network Infrastructure and SecurityDue We.docx
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutlet
 
For each question provide a one to two sentences per questi.pdf
For each question provide a one to two sentences per questi.pdfFor each question provide a one to two sentences per questi.pdf
For each question provide a one to two sentences per questi.pdf
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 

More from jwilliam16

This essay due on 214 and should focus on some of the topics and su.docx
This essay due on 214 and should focus on some of the topics and su.docxThis essay due on 214 and should focus on some of the topics and su.docx
This essay due on 214 and should focus on some of the topics and su.docxjwilliam16
 
This document should be at least 12 pages long minus the cover and  .docx
This document should be at least 12 pages long minus the cover and  .docxThis document should be at least 12 pages long minus the cover and  .docx
This document should be at least 12 pages long minus the cover and  .docxjwilliam16
 
This document is for Coventry University students for their ow.docx
This document is for Coventry University students for their ow.docxThis document is for Coventry University students for their ow.docx
This document is for Coventry University students for their ow.docxjwilliam16
 
This document is copyrigh.docx
This document is copyrigh.docxThis document is copyrigh.docx
This document is copyrigh.docxjwilliam16
 
This discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docxThis discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docxjwilliam16
 
This discussion topic is in two parts. Part 1 What responsibilities.docx
This discussion topic is in two parts. Part 1 What responsibilities.docxThis discussion topic is in two parts. Part 1 What responsibilities.docx
This discussion topic is in two parts. Part 1 What responsibilities.docxjwilliam16
 
This discussion will address the topic of death and children. Yo.docx
This discussion will address the topic of death and children. Yo.docxThis discussion will address the topic of death and children. Yo.docx
This discussion will address the topic of death and children. Yo.docxjwilliam16
 
This discussion should be completed after studying The Importa.docx
This discussion should be completed after studying The Importa.docxThis discussion should be completed after studying The Importa.docx
This discussion should be completed after studying The Importa.docxjwilliam16
 
This discussion provides an opportunity to evaluate a variety of.docx
This discussion provides an opportunity to evaluate a variety of.docxThis discussion provides an opportunity to evaluate a variety of.docx
This discussion provides an opportunity to evaluate a variety of.docxjwilliam16
 
This discussion provides us with the importance of understanding mul.docx
This discussion provides us with the importance of understanding mul.docxThis discussion provides us with the importance of understanding mul.docx
This discussion provides us with the importance of understanding mul.docxjwilliam16
 
This discussion is focused on the accusations made against Jason.docx
This discussion is focused on the accusations made against Jason.docxThis discussion is focused on the accusations made against Jason.docx
This discussion is focused on the accusations made against Jason.docxjwilliam16
 
This discussion is based on the primary source documents found in Ch.docx
This discussion is based on the primary source documents found in Ch.docxThis discussion is based on the primary source documents found in Ch.docx
This discussion is based on the primary source documents found in Ch.docxjwilliam16
 
This discussion has two parts. To build a strong multinational.docx
This discussion has two parts. To build a strong multinational.docxThis discussion has two parts. To build a strong multinational.docx
This discussion has two parts. To build a strong multinational.docxjwilliam16
 
This discussion has three parts. Leadership varies widely by c.docx
This discussion has three parts. Leadership varies widely by c.docxThis discussion has three parts. Leadership varies widely by c.docx
This discussion has three parts. Leadership varies widely by c.docxjwilliam16
 
This Discussion has 3 partsLymphaticDefine lymphedema..docx
This Discussion has 3 partsLymphaticDefine lymphedema..docxThis Discussion has 3 partsLymphaticDefine lymphedema..docx
This Discussion has 3 partsLymphaticDefine lymphedema..docxjwilliam16
 
This discussion has 2 partsYou are working as a financial.docx
This discussion has 2 partsYou are working as a financial.docxThis discussion has 2 partsYou are working as a financial.docx
This discussion has 2 partsYou are working as a financial.docxjwilliam16
 
This exercise asks you tochoose onehominidfrom b.docx
This exercise asks you tochoose onehominidfrom b.docxThis exercise asks you tochoose onehominidfrom b.docx
This exercise asks you tochoose onehominidfrom b.docxjwilliam16
 
This discussion focuses on the films Easy Rider and Pump up the V.docx
This discussion focuses on the films Easy Rider and Pump up the V.docxThis discussion focuses on the films Easy Rider and Pump up the V.docx
This discussion focuses on the films Easy Rider and Pump up the V.docxjwilliam16
 
This discussion focuses on syntax and how it sets a genre apart. Thi.docx
This discussion focuses on syntax and how it sets a genre apart. Thi.docxThis discussion focuses on syntax and how it sets a genre apart. Thi.docx
This discussion focuses on syntax and how it sets a genre apart. Thi.docxjwilliam16
 
This Extracreditassignment is available for those of you.docx
This Extracreditassignment is available for those of you.docxThis Extracreditassignment is available for those of you.docx
This Extracreditassignment is available for those of you.docxjwilliam16
 

More from jwilliam16 (20)

This essay due on 214 and should focus on some of the topics and su.docx
This essay due on 214 and should focus on some of the topics and su.docxThis essay due on 214 and should focus on some of the topics and su.docx
This essay due on 214 and should focus on some of the topics and su.docx
 
This document should be at least 12 pages long minus the cover and  .docx
This document should be at least 12 pages long minus the cover and  .docxThis document should be at least 12 pages long minus the cover and  .docx
This document should be at least 12 pages long minus the cover and  .docx
 
This document is for Coventry University students for their ow.docx
This document is for Coventry University students for their ow.docxThis document is for Coventry University students for their ow.docx
This document is for Coventry University students for their ow.docx
 
This document is copyrigh.docx
This document is copyrigh.docxThis document is copyrigh.docx
This document is copyrigh.docx
 
This discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docxThis discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docx
 
This discussion topic is in two parts. Part 1 What responsibilities.docx
This discussion topic is in two parts. Part 1 What responsibilities.docxThis discussion topic is in two parts. Part 1 What responsibilities.docx
This discussion topic is in two parts. Part 1 What responsibilities.docx
 
This discussion will address the topic of death and children. Yo.docx
This discussion will address the topic of death and children. Yo.docxThis discussion will address the topic of death and children. Yo.docx
This discussion will address the topic of death and children. Yo.docx
 
This discussion should be completed after studying The Importa.docx
This discussion should be completed after studying The Importa.docxThis discussion should be completed after studying The Importa.docx
This discussion should be completed after studying The Importa.docx
 
This discussion provides an opportunity to evaluate a variety of.docx
This discussion provides an opportunity to evaluate a variety of.docxThis discussion provides an opportunity to evaluate a variety of.docx
This discussion provides an opportunity to evaluate a variety of.docx
 
This discussion provides us with the importance of understanding mul.docx
This discussion provides us with the importance of understanding mul.docxThis discussion provides us with the importance of understanding mul.docx
This discussion provides us with the importance of understanding mul.docx
 
This discussion is focused on the accusations made against Jason.docx
This discussion is focused on the accusations made against Jason.docxThis discussion is focused on the accusations made against Jason.docx
This discussion is focused on the accusations made against Jason.docx
 
This discussion is based on the primary source documents found in Ch.docx
This discussion is based on the primary source documents found in Ch.docxThis discussion is based on the primary source documents found in Ch.docx
This discussion is based on the primary source documents found in Ch.docx
 
This discussion has two parts. To build a strong multinational.docx
This discussion has two parts. To build a strong multinational.docxThis discussion has two parts. To build a strong multinational.docx
This discussion has two parts. To build a strong multinational.docx
 
This discussion has three parts. Leadership varies widely by c.docx
This discussion has three parts. Leadership varies widely by c.docxThis discussion has three parts. Leadership varies widely by c.docx
This discussion has three parts. Leadership varies widely by c.docx
 
This Discussion has 3 partsLymphaticDefine lymphedema..docx
This Discussion has 3 partsLymphaticDefine lymphedema..docxThis Discussion has 3 partsLymphaticDefine lymphedema..docx
This Discussion has 3 partsLymphaticDefine lymphedema..docx
 
This discussion has 2 partsYou are working as a financial.docx
This discussion has 2 partsYou are working as a financial.docxThis discussion has 2 partsYou are working as a financial.docx
This discussion has 2 partsYou are working as a financial.docx
 
This exercise asks you tochoose onehominidfrom b.docx
This exercise asks you tochoose onehominidfrom b.docxThis exercise asks you tochoose onehominidfrom b.docx
This exercise asks you tochoose onehominidfrom b.docx
 
This discussion focuses on the films Easy Rider and Pump up the V.docx
This discussion focuses on the films Easy Rider and Pump up the V.docxThis discussion focuses on the films Easy Rider and Pump up the V.docx
This discussion focuses on the films Easy Rider and Pump up the V.docx
 
This discussion focuses on syntax and how it sets a genre apart. Thi.docx
This discussion focuses on syntax and how it sets a genre apart. Thi.docxThis discussion focuses on syntax and how it sets a genre apart. Thi.docx
This discussion focuses on syntax and how it sets a genre apart. Thi.docx
 
This Extracreditassignment is available for those of you.docx
This Extracreditassignment is available for those of you.docxThis Extracreditassignment is available for those of you.docx
This Extracreditassignment is available for those of you.docx
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

This final assignment will be a departure from the three previous.docx

  • 1. This final assignment will be a departure from the three previous Analysis Assignments. It will require you to research, develop, and write an APA formatted research paper on Computer Network Security Issues. Using the following steps will guide you through the process. 1) You have the basic knowledge of network hardware, software, and operational theory from your work during this course thus far, which will be utilized in this research effort. 2) While some students may have considerable knowledge of cybersecurity issues, we are assuming you do not. As a result, the eBook Network Security A Practical Approach which is posted should be studied and utilized as your security issues resource, along with additional Internet research as you desire. The eBook was published in 2006, but the fundamental security issues described in it have not changed. 3) The following research questions can be used as a guide or outline for the development of your research paper: a. Discuss the types/sources categories of security threats that can damage or destroy network operations and ultimately the data and information. Consider both cyber threats as well as physical threats (building/server security, fire or similar catastrophic event, personnel access to equipment, et al). b. Consider and discuss the types of cyber attacks that can be leveraged against network hardware, i.e. keystroke loggers, attacks on router and switches, network media, and other vulnerable network hardware. c. Consider and discuss the types of cyber-attacks that are leveraged through network topologies, i.e. types of networks and remote access. Also, discuss what parts of the OSI network model are most vulnerable to attack. d. Research and discuss the following types of cyber-attacks that can penetrate network operations, with extensive detail on the inner-workings of the network hardware and digital technology involved: TCP spoofing, denial of service attacks, wireless network attacks, and Internet of Things (IoT) security issues. e. Briefly discuss the role of the human factor (users following
  • 2. security procedures such as passwords and falling for phishing attacks) in network security. f. Detail the five most important factors or potential issues you should always monitor to maintain a secure network. g. Finally, draw conclusions and summarize the key points from your literature research. 4) The document should be prepared following these guidelines: a. 10 pages, including a cover page and reference list, double spaced or 2800 words minimum. b. APA format should be followed with at least 8 references (see the APA format tips PPT). c. Diagrams and graphics are encouraged but not mandatory. d. The document should be well organized and professionally written, carefully proofread, and spell-checked and contain an introduction and conclusion paragraphs. e. Heading throughout is recommended to enhance the readability and interest of the reader. 5) The document may be submitted up to or on the last day of the term for this course, Sunday, May 10, 2020, at 11:59 pm EST.