Perform a scan of your home and business network

Assignment Help Computer Network Security
Reference no: EM131706458

Assignment

The purpose of this assignment is to familiarize students with a few networking concepts that are frequently utilized by IT professionals.

1. Download/install the Fing application on your mobile device, smartphone, or tablet. If you do not have any of these devices, use Google to identify and install a similar application on your computer. Perform a scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences. Use the application to determine additional information on the results.

2. Download and install the NMAP application on your PC. Use NMAP to scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences. Use the application to determine additional information on the results.

Research and write a paper (250-500 words) on the reasons why these applications might be valuable in troubleshooting and securing network(s). Provide details on your results from Steps 1 and 2 and how those results can specifically be used to troubleshoot and secure your network in the future.

Be sure to cite your research, as well as the tools you used to perform actions related to the research.

Prepare this assignment according to the guidelines found in the GCU Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Reference no: EM131706458

Questions Cloud

What are the characteristics of a perfectly competitive : What are the characteristics of a perfectly competitive market? Explain why the market for Microsoft stock is perfectly competitive.
What dangers or discomforts might the unethical action cause : What is the inappropriate action(s)? What dangers or discomforts might the unethical action cause? Is there a parallel in the physical world to this scenario?
Describe your global markeing strategy : Describe your global markeing strategy and how, if at all, you would modify the product feature or price by country in your market selection.
Review case based on video surveillance company : Citywatcher.com, a video surveillance company, has issued a work rule requiring its employees to have radio frequency identification chips embedded.
Perform a scan of your home and business network : Perform a scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences.
Market-based approaches to reducing air pollution : The government is thinking about market-based approaches to reducing air pollution such as corrective taxes, command and control, and tradeable pollution.
Why immune regulation is important give example : What are primary lymphoid organs and secondary lymphoid organs and their functions? Why immune regulation is important? Give example
Does the ad appeal to your emotions : What motivations does the ad use to grab and hold attention? Does the ad appeal to your emotions? Why or why not?
What unfair labor practices has lawson committed : When the UFCW filed a representation petition with the NLRB, seeking an election, employees were told that the stores would close if they voted in the union.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe the function of a firewall

Describe the function of a firewall. (Minimum word count: 70) Which tunneling protocols are commonly used by VPNs? (Minimum word count: 25) Describe a differential backup.

  Explain security issues related to researched technologies

Explain two security issues related to the researched technologies. Speculate whether the protection on selected device is sufficient for the data it contains.

  Explain policies and procedures that will be used on network

Create a memo to the company employees that describes the policies and procedures that will be used on the network. Write your memo so that it describes what the employees must do, and what the employees are not allowed to do.

  Evaluate ability of different cloud computing architectures

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as your primary references.

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Discusses some of approaches to cybercrime that are taken

This chapter discusses some of the approaches to cybercrime that are taken by both the Hong Kong and Singapore governments.

  Should copyright laws protect musical compositions

Which is more likely to be effective in protecting intellectual property in digital media such as CDs and DVDs: tougher copyright laws or new technologies incorporating more sophisticated anti-copying measures? Or is it hopeless to try to protect ..

  Identify different computer crimes that you are aware of

Computer crime has become a serious matter; for your Discussion Board post, consider the following: Identify 3 different computer crimes that you are aware of

  How did the attacker gain access to the system

How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc. What IP address or addresses did the attacker use?

  Compare and contrast physical internetwork and host-to-host

Compare and contrast physical, internetwork, host-to-host, and application layer threats.

  Use a two-stage transposition technique to encrypt

Use a two-stage transposition technique to encrypt the following message using the key "Decrypt". Ignore the comma and the period in the message

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd