University of Nairobi Network Security Discussion
Question Description
Its based on this book(attached) , but its not needed to be from it.
12 time new roman single spaced.
Answer the following discussion questions as needed:
Ch.3. Cryptography
Chronicle the most significant events and discoveries in the history of cryptology
Explain the basic principles of cryptography
Describe the operating principles of the most popular cryptographic tools
List and explain the major protocols used for secure communications
Discuss the nature and execution of attacks used against cryptosystems
Ch.4. Firewall Technologies and Administration
Describe what a firewall does
Explain how a firewall restricts access to a network
List the types of firewall protection as well as the types of firewall implementations and the ways they are used
Describe how firewall rules are created and how they are used to control the behavior of the firewall
Explain how instruction detection and prevention systems are related and how they may be made to interact with one another
Ch.5. Network Authentication and Remote Access Using VPN
Define access control and identify the various ways it can be implemented
Explain why authentication is a critical aspect of network access control
Identify the component parts of virtual private networks (VPNs)
List and define the essential activities that an VPN must be able to perform
Explain the various VPN architectures in common use
Ch.6. Network Monitoring and Intrusion Detection and Prevention Systems
Define the basic concepts of network packet analysis
Explain the various network packet formats and standards
Describe how packet analysis forms the basis of network intrusion detection
Discuss the various types of intrusion detection and prevention
Explain intrusion detection and prevention deployments and response strategies
Describe various honeypot technologies
Ch.7 Wireless Network Security
Identify various wireless technologies and standards
Recognize the topology and architecture of wireless networks
Define popular wireless security protocols
Describe various WLAN security concerns
Discuss the security issues regarding Bluetooth technology
Ch. 8 Security of Web Applications
List the various Internet services in use
Identify threats to Internet services and basic countermeasures
Describe the basics of Web client-server communication
Identify the various Web languages and describe their uses
Identify various Web threats and attacks
Discuss the steps necessary to secure a Web server
Ch. 9 Network Vulnerability Assessment
Name the common categories of vulnerabilities
Discuss common system and network vulnerabilities
Find network vulnerabilities using scanning tools and in-depth penetration testing
Access sources of information about vulnerabilities and determine how best to remediate those vulnerabilities
Ch. 10 Auditing, Monitoring, and Logging
List the various events that should be monitored in network environments
Describe the various network logs available for monitoring
Discuss the various log management, SIEM, and monitoring technologies
Explain the role that configuration and change management play in auditing the network environment
Discuss formal audit programs and how they relate to network environments
Describe Certification and Accreditation (C&A) programs implemented by the U.S. federal government and other international agencies
Ch. 11 Contingency Planning and Networking Incident Response
Explain the need for contingency planning
List the major components of contingency planning
Create a simple set of contingency plans, using business impact analysis
Prepare and execute a test of contingency plans
Explain the network incident response process
Explain the need for sound backup and recovery practices and what they consist of
Ch. 12 Digital Forensics
Explain how U.S. law enforcement and the U.S. legal system affect digital forensics
Describe the roles and responsibilities of digital forensic team members
List the steps involved in collecting digital evidence
Discuss the process used to analyze evidence
Explain how encryption can thwart digital forensic analysis
"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."