network security 28


* Objectives

Find methods to measure the security level of a computer network setup and/or demonstrate ways that security can be breached:

  • Creating and/or using network sniffers
  • Testing the effectiveness of antivirus software to detect network worms (and the performance of this software)

* Background


A security breach is any incident that results in unauthorized access of data, applications,
services, networks and/or devices by bypassing their underlying security
mechanisms. A security breach occurs when an individual or an application
illegitimately enters a private, confidential or unauthorized logical IT
perimeter.

A security breach is also known as a security violation.

* Research

  • Research various methods security could be breached and write a report on it.
  • List the different methods you identified in your search. (Information must be included: Name, type of attack, how it works, and what did it affect).

Project Deliverables

  • Projects reports are expected to be 5 pages long. Don’t stretch the report just to meet a particular page number, nor feel constrained if it needs to be longer to get your key points and results across.
  • A good report must answer the standard questions about any research project.

"Is this question part of your assignment? We can help"

ORDER NOW