Two network security software tools

Assignment Help Basic Computer Science
Reference no: EM13936839

You are required to choose TWO network security software tools and conduct a comparison of them. The two tools must satisfy the following criteria:

a. They must be of a similar type. Otherwise, a comparison would be unfair and of limited purpose.
b. They must be of a type listed on page 22. Other types are not acceptable unless explicitly agreed by the module leader.
c. They must be agreed with your module leader. The means of reaching this agreement are described below. The number of students comparing the same two tools will be limited to a maximum of 5, on a first-come, first-serve basis. Furthermore, you should ensure that there is no significant overlap between this coursework and the work that you are undertaking for your final year project. If you are in any doubt, please discuss your choice of tools with the module leader, prior to the deadline specified below.
d. You must be capable of demonstrating "Practical: Configuration of a network security tool under time-constrained, (20 minutes) laboratory conditions"your tools to your tutor(s) using the hardware/software available in room KD.2.15.

You must submit a report of NOT more than 2,000 words (excluding the assignment cover sheet, title page, screenshots and reference list) which contains the following:

1. A brief description of the two tools that you have chosen to compare.
2. A brief explanation of the criteria that you used to compare the two tools.
3. A brief summary of the outcome of the comparison based on the criteria that you have selected. The outcome should be presented in the form of a table with three columns; Column 1 - the evaluation criteria, Column 2 - an assessment of tool 1 against the criteria and Column 3

- an assessment of tool 2 against the criteria. Your summary should also include an overall assessment i.e. which of the two tools would you recommend and why.
4. A reference list indicating the sources of information that you have used i) to develop your understanding of the purpose and function of your chosen tools and ii) to select your evaluation criteria.

Please avoid the inclusion of large numbers of screenshots. Include only those that are necessary to illustrate the application of your evaluation criteria.

Both the submission and the assessment of this coursework will be entirely electronic. You should therefore submit your assignment via the Turnitin link on Moodle website for this module. You will NOT be able to submit a printed copy of your work to the ACE Reception.

You will receive assignment feedback via Turnitin. Details of how you can obtain your feedback will be provided shortly after the assignment deadline.

Assessment criteria

By Friday 7th November 2014, you need to have obtained your module leader's agreement to your chosen tools. You should post details of your proposed tools in the appropriate discussion forum on Moodle You should include with the details confirmation that there is no significant overlap between this coursework and your final year project. Your module leader will indicate, via Moodle, whether or not your choice is acceptable. You will not be able to change your choice after the above date so it is essential that you start your investigation/planning as soon as possible.

Reference no: EM13936839

Questions Cloud

Prepare summary journal entries for april : Prepare summary journal entries for April (without disposing of under- or overallocated conversion costs). Assume no direct materials variances.
What factors should sido consider before choosing a supplier : Which supplier should Sido choose? Show all calculations. What other factors should Sido consider before choosing a supplier?
Graded for technical content and from a grammar perspective : Write about Wal-Mart. It will be graded for technical content and from a grammar perspective. The paper should be approximately 2,000 words in length. References need to be cited throughout the paper and in the reference section
Is this a strand of dna or rna : If DNA and a base were inserted at the beginning of the 5' end of the molecule, how would that affect protein synthesis and the resultant protein? (Hint: think about the code), What would happen to the reading frame if three bases were inserted/del..
Two network security software tools : They must be of a type listed on page 22. Other types are not acceptable unless explicitly agreed by the module leader. c. They must be agreed with your module leader. The means of reaching this agreement are described below.
Explain the importance of pointers : Assuming an array has to be sorted, inserting a new element required shifting, in the worst case, n elements, where n is the number of elements in the array, i.e.:
What are the criteria for good primers in a pcr reaction : What are the criteria for "good" primers in a PCR reaction? Describe how you would use site-directed mutagenesis to change a BamHI restriction site into an EcoRI site.
Factors that influence buying behavior : Factors that influence buying behavior - Cultural, social, personal and psychological. Include consumers buying decision process.
Enthusiasm and perseverance in gaining new skills : Enthusiasm and perseverance in gaining new skills and knowledge over the years, makes me a suitable candidate for astrophysics. I look forward to the challenges and the moment when most of the things

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd