Perform a scan of your home and business network

Assignment Help Computer Network Security
Reference no: EM131706458

Assignment

The purpose of this assignment is to familiarize students with a few networking concepts that are frequently utilized by IT professionals.

1. Download/install the Fing application on your mobile device, smartphone, or tablet. If you do not have any of these devices, use Google to identify and install a similar application on your computer. Perform a scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences. Use the application to determine additional information on the results.

2. Download and install the NMAP application on your PC. Use NMAP to scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences. Use the application to determine additional information on the results.

Research and write a paper (250-500 words) on the reasons why these applications might be valuable in troubleshooting and securing network(s). Provide details on your results from Steps 1 and 2 and how those results can specifically be used to troubleshoot and secure your network in the future.

Be sure to cite your research, as well as the tools you used to perform actions related to the research.

Prepare this assignment according to the guidelines found in the GCU Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Reference no: EM131706458

Questions Cloud

What are the characteristics of a perfectly competitive : What are the characteristics of a perfectly competitive market? Explain why the market for Microsoft stock is perfectly competitive.
What dangers or discomforts might the unethical action cause : What is the inappropriate action(s)? What dangers or discomforts might the unethical action cause? Is there a parallel in the physical world to this scenario?
Describe your global markeing strategy : Describe your global markeing strategy and how, if at all, you would modify the product feature or price by country in your market selection.
Review case based on video surveillance company : Citywatcher.com, a video surveillance company, has issued a work rule requiring its employees to have radio frequency identification chips embedded.
Perform a scan of your home and business network : Perform a scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences.
Market-based approaches to reducing air pollution : The government is thinking about market-based approaches to reducing air pollution such as corrective taxes, command and control, and tradeable pollution.
Why immune regulation is important give example : What are primary lymphoid organs and secondary lymphoid organs and their functions? Why immune regulation is important? Give example
Does the ad appeal to your emotions : What motivations does the ad use to grab and hold attention? Does the ad appeal to your emotions? Why or why not?
What unfair labor practices has lawson committed : When the UFCW filed a representation petition with the NLRB, seeking an election, employees were told that the stores would close if they voted in the union.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd