Security was once a separate topic from networking and many professionals dismissed it as unnecessary. Today, network security is one of the most important parts of the networking professional’s job. A key point in the threat environment today is that wizard hackers who hacked for the thrill of breaking in and the enhancement of their reputation have given way to career criminals. Computer crime for traditional greed motives dominates the threat environment today.
The planning section has many important concepts. Arguably, the most important planning principle is risk analysis. You cannot stop all attacks, any more than society can stop all robbery. The important thing is to spend money on protection only if there is a larger reduction in probable losses.
For this activity utilize Microsoft Visio or a subsequent visual design tool and create a diagram that lists types of attackers in a way that illustrates them from most dangerous to least dangerous.
Create categories to place these attackers in such as:
Once you have completed this, describe the types of attacks that each attacker is likely to engage in, and be sure to analyze the weaknesses that these attacks are targeting as well as which layer of the OSI model they are targeting.
The report must be a minimum of 7 pages, excluding the title page, Visio diagrams, and references. It must include at a minimum of 7 peer-reviewed sources to justify your assertions.
Total of 11 Pages at least
Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
This template supports the sidebar's widgets. Add one or use Full Width layout.