How a network administrator could use information generated


Assignment: Network Security

Length: 1000 words.

1) Short Report

Using industry reports, whitepapers, academic articles and other reliable sources, research the issue of network security threats faced by businesses in 2021-2022. Write a short report identifying and explaining the top ten network security threats. Also, justify why you chose those specific threats in your list of top ten. Include appropriate charts and diagrams.

Note:

a. Write minimum 750 words for this short report. Although there is no rigid maximum word limit, around 1000 words maximum will be appropriate.

b. Use appropriate headings and sub-headings in your report.

c. You should provide credible references according to the Faculty guidelines. Get referencing style guides and help with referencing from Charles Sturt's Referencing webpage.

2) Hands-on Project

inSSIDer is a popular wireless network scanner. Download the free version of this application from https://www.metageek.com/downloads/inssider-win/ . Follow the instructions to use it as explained in MetaGeek's website. Run the application to scan Wi-Fi network.

Now, write a report including the following information.

a. List every piece of information that the inSSIDer scanner normally produces [For example, the MAC (physical) address of the network, its SSID etc.]. Briefly explain what each one of them mean.

b. Now, state and explain the information that you obtained from your ‘run' of the application. For every piece of information, include a screenshot from your ‘run'. What are your most important observations? Why do you consider them to be important?

c. Explain in detail, how a network administrator could use the information generated by the inSSIDer Wi-Fi network analyser.

d. Do you think, attackers could also benefit from such Wi-Fi network analysers? Justify your response in detail.

e. Finally, search the internet for five (5) other wireless network analysers. Based on the information available about these products, which one would you recommend for a small business and why? Make assumptions about the type, settings, requirements of the business.

Format your assignment according to the give formatting requirements:

a. The answer must be double spaced, typed, using Times New Roman font (size 12), with one-inch margins on all sides.

b. The response also includes a cover page containing the title of the assignment, the course title, the student's name, and the date. The cover page is not included in the required page length.

c. Also include a reference page. The references and Citations should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: How a network administrator could use information generated
Reference No:- TGS03186098

Now Priced at $80 (50% Discount)

Recommended (96%)

Rated (4.8/5)