Select Page

University of Nairobi Network Security Discussion

Question Description

Its based on this book(attached) , but its not needed to be from it.

12 time new roman single spaced.

Answer the following discussion questions as needed:

Ch.3. Cryptography

Chronicle the most significant events and discoveries in the history of cryptology

Explain the basic principles of cryptography

Describe the operating principles of the most popular cryptographic tools

List and explain the major protocols used for secure communications

Discuss the nature and execution of attacks used against cryptosystems

Ch.4. Firewall Technologies and Administration

Describe what a firewall does

Explain how a firewall restricts access to a network

List the types of firewall protection as well as the types of firewall implementations and the ways they are used

Describe how firewall rules are created and how they are used to control the behavior of the firewall

Explain how instruction detection and prevention systems are related and how they may be made to interact with one another

Ch.5. Network Authentication and Remote Access Using VPN

Define access control and identify the various ways it can be implemented

Explain why authentication is a critical aspect of network access control

Identify the component parts of virtual private networks (VPNs)

List and define the essential activities that an VPN must be able to perform

Explain the various VPN architectures in common use

Ch.6. Network Monitoring and Intrusion Detection and Prevention Systems

Define the basic concepts of network packet analysis

Explain the various network packet formats and standards

Describe how packet analysis forms the basis of network intrusion detection

Discuss the various types of intrusion detection and prevention

Explain intrusion detection and prevention deployments and response strategies

Describe various honeypot technologies

Ch.7 Wireless Network Security

Identify various wireless technologies and standards

Recognize the topology and architecture of wireless networks

Define popular wireless security protocols

Describe various WLAN security concerns

Discuss the security issues regarding Bluetooth technology

Ch. 8 Security of Web Applications

List the various Internet services in use

Identify threats to Internet services and basic countermeasures

Describe the basics of Web client-server communication

Identify the various Web languages and describe their uses

Identify various Web threats and attacks

Discuss the steps necessary to secure a Web server

Ch. 9 Network Vulnerability Assessment

Name the common categories of vulnerabilities

Discuss common system and network vulnerabilities

Find network vulnerabilities using scanning tools and in-depth penetration testing

Access sources of information about vulnerabilities and determine how best to remediate those vulnerabilities

Ch. 10 Auditing, Monitoring, and Logging

List the various events that should be monitored in network environments

Describe the various network logs available for monitoring

Discuss the various log management, SIEM, and monitoring technologies

Explain the role that configuration and change management play in auditing the network environment

Discuss formal audit programs and how they relate to network environments

Describe Certification and Accreditation (C&A) programs implemented by the U.S. federal government and other international agencies

Ch. 11 Contingency Planning and Networking Incident Response

Explain the need for contingency planning

List the major components of contingency planning

Create a simple set of contingency plans, using business impact analysis

Prepare and execute a test of contingency plans

Explain the network incident response process

Explain the need for sound backup and recovery practices and what they consist of

Ch. 12 Digital Forensics

Explain how U.S. law enforcement and the U.S. legal system affect digital forensics

Describe the roles and responsibilities of digital forensic team members

List the steps involved in collecting digital evidence

Discuss the process used to analyze evidence

Explain how encryption can thwart digital forensic analysis

"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you "A" results."

Order Solution Now