SlideShare a Scribd company logo
This final assignment will be a departure from the three
previous Analysis Assignments. It will require you to research,
develop, and write an APA formatted research paper on
Computer Network Security Issues. Using the following steps
will guide you through the process. 1) You have the basic
knowledge of network hardware, software, and operational
theory from your work during this course thus far, which will be
utilized in this research effort. 2) While some students may
have considerable knowledge of cybersecurity issues, we are
assuming you do not. As a result, the eBook Network Security
A Practical Approach which is posted should be studied and
utilized as your security issues resource, along with additional
Internet research as you desire. The eBook was published in
2006, but the fundamental security issues described in it have
not changed. 3) The following research questions can be used as
a guide or outline for the development of your research paper:
a. Discuss the types/sources categories of security threats that
can damage or destroy network operations and ultimately the
data and information. Consider both cyber threats as well as
physical threats (building/server security, fire or similar
catastrophic event, personnel access to equipment, et al). b.
Consider and discuss the types of cyber attacks that can be
leveraged against network hardware, i.e. keystroke loggers,
attacks on router and switches, network media, and other
vulnerable network hardware. c. Consider and discuss the types
of cyber-attacks that are leveraged through network topologies,
i.e. types of networks and remote access. Also, discuss what
parts of the OSI network model are most vulnerable to attack. d.
Research and discuss the following types of cyber-attacks that
can penetrate network operations, with extensive detail on the
inner-workings of the network hardware and digital technology
involved: TCP spoofing, denial of service attacks, wireless
network attacks, and Internet of Things (IoT) security issues. e.
Briefly discuss the role of the human factor (users following
security procedures such as passwords and falling for phishing
attacks) in network security. f. Detail the five most important
factors or potential issues you should always monitor to
maintain a secure network. g. Finally, draw conclusions and
summarize the key points from your literature research. 4) The
document should be prepared following these guidelines: a. 10
pages, including a cover page and reference list, double spaced
or 2800 words minimum. b. APA format should be followed
with at least 8 references (see the APA format tips PPT). c.
Diagrams and graphics are encouraged but not mandatory. d.
The document should be well organized and professionally
written, carefully proofread, and spell-checked and contain an
introduction and conclusion paragraphs. e. Heading throughout
is recommended to enhance the readability and interest of the
reader. 5) The document may be submitted up to or on the last
day of the term for this course, Sunday, May 10, 2020, at 11:59
pm EST.

More Related Content

Similar to This final assignment will be a departure from the three previous.docx

Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
sholingarjosh56
 
Project Deliverable 5 Network Infrastructure and SecurityThis
Project Deliverable 5 Network Infrastructure and SecurityThisProject Deliverable 5 Network Infrastructure and SecurityThis
Project Deliverable 5 Network Infrastructure and SecurityThis
davieec5f
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
PROBOTEK
 
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docxSubject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
darwinming1
 
Project Deliverable 5 Network Infrastructure and SecurityDu
Project Deliverable 5 Network Infrastructure and SecurityDuProject Deliverable 5 Network Infrastructure and SecurityDu
Project Deliverable 5 Network Infrastructure and SecurityDu
davieec5f
 
Project Deliverable 5 Network Infrastructure and SecurityDue We.docx
Project Deliverable 5 Network Infrastructure and SecurityDue We.docxProject Deliverable 5 Network Infrastructure and SecurityDue We.docx
Project Deliverable 5 Network Infrastructure and SecurityDue We.docx
denneymargareta
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutlet
Patmorez
 
For each question provide a one to two sentences per questi.pdf
For each question provide a one to two sentences per questi.pdfFor each question provide a one to two sentences per questi.pdf
For each question provide a one to two sentences per questi.pdf
ablazeaepl
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
PhD Assistance
 

Similar to This final assignment will be a departure from the three previous.docx (10)

Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
Project Deliverable 5 Network Infrastructure and SecurityThis
Project Deliverable 5 Network Infrastructure and SecurityThisProject Deliverable 5 Network Infrastructure and SecurityThis
Project Deliverable 5 Network Infrastructure and SecurityThis
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
 
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docxSubject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
Subject  IT-FP4070 – Cyber Defense and Countermeasures. Assignm.docx
 
Project Deliverable 5 Network Infrastructure and SecurityDu
Project Deliverable 5 Network Infrastructure and SecurityDuProject Deliverable 5 Network Infrastructure and SecurityDu
Project Deliverable 5 Network Infrastructure and SecurityDu
 
Project Deliverable 5 Network Infrastructure and SecurityDue We.docx
Project Deliverable 5 Network Infrastructure and SecurityDue We.docxProject Deliverable 5 Network Infrastructure and SecurityDue We.docx
Project Deliverable 5 Network Infrastructure and SecurityDue We.docx
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutlet
 
For each question provide a one to two sentences per questi.pdf
For each question provide a one to two sentences per questi.pdfFor each question provide a one to two sentences per questi.pdf
For each question provide a one to two sentences per questi.pdf
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 

More from jwilliam16

This essay due on 214 and should focus on some of the topics and su.docx
This essay due on 214 and should focus on some of the topics and su.docxThis essay due on 214 and should focus on some of the topics and su.docx
This essay due on 214 and should focus on some of the topics and su.docx
jwilliam16
 
This document should be at least 12 pages long minus the cover and  .docx
This document should be at least 12 pages long minus the cover and  .docxThis document should be at least 12 pages long minus the cover and  .docx
This document should be at least 12 pages long minus the cover and  .docx
jwilliam16
 
This document is for Coventry University students for their ow.docx
This document is for Coventry University students for their ow.docxThis document is for Coventry University students for their ow.docx
This document is for Coventry University students for their ow.docx
jwilliam16
 
This document is copyrigh.docx
This document is copyrigh.docxThis document is copyrigh.docx
This document is copyrigh.docx
jwilliam16
 
This discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docxThis discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docx
jwilliam16
 
This discussion topic is in two parts. Part 1 What responsibilities.docx
This discussion topic is in two parts. Part 1 What responsibilities.docxThis discussion topic is in two parts. Part 1 What responsibilities.docx
This discussion topic is in two parts. Part 1 What responsibilities.docx
jwilliam16
 
This discussion will address the topic of death and children. Yo.docx
This discussion will address the topic of death and children. Yo.docxThis discussion will address the topic of death and children. Yo.docx
This discussion will address the topic of death and children. Yo.docx
jwilliam16
 
This discussion should be completed after studying The Importa.docx
This discussion should be completed after studying The Importa.docxThis discussion should be completed after studying The Importa.docx
This discussion should be completed after studying The Importa.docx
jwilliam16
 
This discussion provides an opportunity to evaluate a variety of.docx
This discussion provides an opportunity to evaluate a variety of.docxThis discussion provides an opportunity to evaluate a variety of.docx
This discussion provides an opportunity to evaluate a variety of.docx
jwilliam16
 
This discussion provides us with the importance of understanding mul.docx
This discussion provides us with the importance of understanding mul.docxThis discussion provides us with the importance of understanding mul.docx
This discussion provides us with the importance of understanding mul.docx
jwilliam16
 
This discussion is focused on the accusations made against Jason.docx
This discussion is focused on the accusations made against Jason.docxThis discussion is focused on the accusations made against Jason.docx
This discussion is focused on the accusations made against Jason.docx
jwilliam16
 
This discussion is based on the primary source documents found in Ch.docx
This discussion is based on the primary source documents found in Ch.docxThis discussion is based on the primary source documents found in Ch.docx
This discussion is based on the primary source documents found in Ch.docx
jwilliam16
 
This discussion has two parts. To build a strong multinational.docx
This discussion has two parts. To build a strong multinational.docxThis discussion has two parts. To build a strong multinational.docx
This discussion has two parts. To build a strong multinational.docx
jwilliam16
 
This discussion has three parts. Leadership varies widely by c.docx
This discussion has three parts. Leadership varies widely by c.docxThis discussion has three parts. Leadership varies widely by c.docx
This discussion has three parts. Leadership varies widely by c.docx
jwilliam16
 
This Discussion has 3 partsLymphaticDefine lymphedema..docx
This Discussion has 3 partsLymphaticDefine lymphedema..docxThis Discussion has 3 partsLymphaticDefine lymphedema..docx
This Discussion has 3 partsLymphaticDefine lymphedema..docx
jwilliam16
 
This discussion has 2 partsYou are working as a financial.docx
This discussion has 2 partsYou are working as a financial.docxThis discussion has 2 partsYou are working as a financial.docx
This discussion has 2 partsYou are working as a financial.docx
jwilliam16
 
This exercise asks you tochoose onehominidfrom b.docx
This exercise asks you tochoose onehominidfrom b.docxThis exercise asks you tochoose onehominidfrom b.docx
This exercise asks you tochoose onehominidfrom b.docx
jwilliam16
 
This discussion focuses on the films Easy Rider and Pump up the V.docx
This discussion focuses on the films Easy Rider and Pump up the V.docxThis discussion focuses on the films Easy Rider and Pump up the V.docx
This discussion focuses on the films Easy Rider and Pump up the V.docx
jwilliam16
 
This discussion focuses on syntax and how it sets a genre apart. Thi.docx
This discussion focuses on syntax and how it sets a genre apart. Thi.docxThis discussion focuses on syntax and how it sets a genre apart. Thi.docx
This discussion focuses on syntax and how it sets a genre apart. Thi.docx
jwilliam16
 
This Extracreditassignment is available for those of you.docx
This Extracreditassignment is available for those of you.docxThis Extracreditassignment is available for those of you.docx
This Extracreditassignment is available for those of you.docx
jwilliam16
 

More from jwilliam16 (20)

This essay due on 214 and should focus on some of the topics and su.docx
This essay due on 214 and should focus on some of the topics and su.docxThis essay due on 214 and should focus on some of the topics and su.docx
This essay due on 214 and should focus on some of the topics and su.docx
 
This document should be at least 12 pages long minus the cover and  .docx
This document should be at least 12 pages long minus the cover and  .docxThis document should be at least 12 pages long minus the cover and  .docx
This document should be at least 12 pages long minus the cover and  .docx
 
This document is for Coventry University students for their ow.docx
This document is for Coventry University students for their ow.docxThis document is for Coventry University students for their ow.docx
This document is for Coventry University students for their ow.docx
 
This document is copyrigh.docx
This document is copyrigh.docxThis document is copyrigh.docx
This document is copyrigh.docx
 
This discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docxThis discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docx
 
This discussion topic is in two parts. Part 1 What responsibilities.docx
This discussion topic is in two parts. Part 1 What responsibilities.docxThis discussion topic is in two parts. Part 1 What responsibilities.docx
This discussion topic is in two parts. Part 1 What responsibilities.docx
 
This discussion will address the topic of death and children. Yo.docx
This discussion will address the topic of death and children. Yo.docxThis discussion will address the topic of death and children. Yo.docx
This discussion will address the topic of death and children. Yo.docx
 
This discussion should be completed after studying The Importa.docx
This discussion should be completed after studying The Importa.docxThis discussion should be completed after studying The Importa.docx
This discussion should be completed after studying The Importa.docx
 
This discussion provides an opportunity to evaluate a variety of.docx
This discussion provides an opportunity to evaluate a variety of.docxThis discussion provides an opportunity to evaluate a variety of.docx
This discussion provides an opportunity to evaluate a variety of.docx
 
This discussion provides us with the importance of understanding mul.docx
This discussion provides us with the importance of understanding mul.docxThis discussion provides us with the importance of understanding mul.docx
This discussion provides us with the importance of understanding mul.docx
 
This discussion is focused on the accusations made against Jason.docx
This discussion is focused on the accusations made against Jason.docxThis discussion is focused on the accusations made against Jason.docx
This discussion is focused on the accusations made against Jason.docx
 
This discussion is based on the primary source documents found in Ch.docx
This discussion is based on the primary source documents found in Ch.docxThis discussion is based on the primary source documents found in Ch.docx
This discussion is based on the primary source documents found in Ch.docx
 
This discussion has two parts. To build a strong multinational.docx
This discussion has two parts. To build a strong multinational.docxThis discussion has two parts. To build a strong multinational.docx
This discussion has two parts. To build a strong multinational.docx
 
This discussion has three parts. Leadership varies widely by c.docx
This discussion has three parts. Leadership varies widely by c.docxThis discussion has three parts. Leadership varies widely by c.docx
This discussion has three parts. Leadership varies widely by c.docx
 
This Discussion has 3 partsLymphaticDefine lymphedema..docx
This Discussion has 3 partsLymphaticDefine lymphedema..docxThis Discussion has 3 partsLymphaticDefine lymphedema..docx
This Discussion has 3 partsLymphaticDefine lymphedema..docx
 
This discussion has 2 partsYou are working as a financial.docx
This discussion has 2 partsYou are working as a financial.docxThis discussion has 2 partsYou are working as a financial.docx
This discussion has 2 partsYou are working as a financial.docx
 
This exercise asks you tochoose onehominidfrom b.docx
This exercise asks you tochoose onehominidfrom b.docxThis exercise asks you tochoose onehominidfrom b.docx
This exercise asks you tochoose onehominidfrom b.docx
 
This discussion focuses on the films Easy Rider and Pump up the V.docx
This discussion focuses on the films Easy Rider and Pump up the V.docxThis discussion focuses on the films Easy Rider and Pump up the V.docx
This discussion focuses on the films Easy Rider and Pump up the V.docx
 
This discussion focuses on syntax and how it sets a genre apart. Thi.docx
This discussion focuses on syntax and how it sets a genre apart. Thi.docxThis discussion focuses on syntax and how it sets a genre apart. Thi.docx
This discussion focuses on syntax and how it sets a genre apart. Thi.docx
 
This Extracreditassignment is available for those of you.docx
This Extracreditassignment is available for those of you.docxThis Extracreditassignment is available for those of you.docx
This Extracreditassignment is available for those of you.docx
 

Recently uploaded

Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

This final assignment will be a departure from the three previous.docx

  • 1. This final assignment will be a departure from the three previous Analysis Assignments. It will require you to research, develop, and write an APA formatted research paper on Computer Network Security Issues. Using the following steps will guide you through the process. 1) You have the basic knowledge of network hardware, software, and operational theory from your work during this course thus far, which will be utilized in this research effort. 2) While some students may have considerable knowledge of cybersecurity issues, we are assuming you do not. As a result, the eBook Network Security A Practical Approach which is posted should be studied and utilized as your security issues resource, along with additional Internet research as you desire. The eBook was published in 2006, but the fundamental security issues described in it have not changed. 3) The following research questions can be used as a guide or outline for the development of your research paper: a. Discuss the types/sources categories of security threats that can damage or destroy network operations and ultimately the data and information. Consider both cyber threats as well as physical threats (building/server security, fire or similar catastrophic event, personnel access to equipment, et al). b. Consider and discuss the types of cyber attacks that can be leveraged against network hardware, i.e. keystroke loggers, attacks on router and switches, network media, and other vulnerable network hardware. c. Consider and discuss the types of cyber-attacks that are leveraged through network topologies, i.e. types of networks and remote access. Also, discuss what parts of the OSI network model are most vulnerable to attack. d. Research and discuss the following types of cyber-attacks that can penetrate network operations, with extensive detail on the inner-workings of the network hardware and digital technology involved: TCP spoofing, denial of service attacks, wireless network attacks, and Internet of Things (IoT) security issues. e. Briefly discuss the role of the human factor (users following
  • 2. security procedures such as passwords and falling for phishing attacks) in network security. f. Detail the five most important factors or potential issues you should always monitor to maintain a secure network. g. Finally, draw conclusions and summarize the key points from your literature research. 4) The document should be prepared following these guidelines: a. 10 pages, including a cover page and reference list, double spaced or 2800 words minimum. b. APA format should be followed with at least 8 references (see the APA format tips PPT). c. Diagrams and graphics are encouraged but not mandatory. d. The document should be well organized and professionally written, carefully proofread, and spell-checked and contain an introduction and conclusion paragraphs. e. Heading throughout is recommended to enhance the readability and interest of the reader. 5) The document may be submitted up to or on the last day of the term for this course, Sunday, May 10, 2020, at 11:59 pm EST.