How security devices can be used to within a larger network


Discussion Post

For your final step, you will synthesize the previous steps and labs to summarize the major findings from this project.

Specifically, you will prepare a technical report that summarizes your findings including:

• Provide a table of common ports for protocols we studied. Discuss how security devices can be used to within a larger network to control subnets and devices within those subnets.

• Discuss network diagnostic tools you used in this lab. Summarize their functionality and describe specifically how you used each tool. Discuss the results you used to assist in both the discovery phase and protocol analysis of the sites you analyzed. What tools impressed you the most and would be most useful for an analyst to employ in the daily activities? What other functionality do you think would be useful to cyber operations analysts?

• Research and discuss the ethical use of these tools. For example, if you discover a serious vulnerability, what you should you do? What communications should you have with site owners prior to conducting vulnerability scans?

The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Other Subject: How security devices can be used to within a larger network
Reference No:- TGS03177213

Now Priced at $20 (50% Discount)

Recommended (91%)

Rated (4.3/5)