Reference no: EM132517763
Part 1
Use the Internet to research and explore vulnerabilities that are related to TCP/IP (transmission control protocol/Internet protocol). In a 3-5-paragraph posting, provide the following information:
Current vulnerabilities related to TCP/IP
Countermeasures that address the vulnerabilities
Recommended products for addressing TCP/IP vulnerabilities
If you have experience with TCP/IP, include your own experience and recommendations in this posting.
Part 2
Choose five of the following topics related to perimeter security and prepare a 5 - 7 slide presentation on that topic. The slide presentation should contain speaker notes of at least 3 paragraphs for each slide to explain the subject further. Also, include a cover slide and a reference slide.
Choose five of the following topics for the individual portion of the project:
State-based filters
Border routers
Screened subnets
Demilitarized zones (DMS)
Intrusion prevention system (IPS)
Intrusion detection system (IDS)
Proxy firewalls
Access control list filters
Fail safe equipment
Equipment redundancy
The individual presentation should include the following:
An explanation of how the security method works
Advantages and disadvantages of the chosen security
Trade-offs for using the specific security
Issues that are addressed by the security method chosen