Use monitoring technologies Wire shark and Snort in the Workspace virtual machine to compile a malicious network activity report for financial institutions and a bulletin to a financial services consortium.

Packet Capture and Intrusion Detection/Prevention Systems.
In this project, you will use monitoring technologies Wire shark and Snort in the Workspace virtual machine to compile a malicious network activity report for financial institutions and a bulletin to a financial services consortium. The report should be eight pages double-spaced with citations in SPA format. The bulletin should be one page double-spaced.

There are eight steps to complete the project. Most steps of this project should take no more than two hours to complete, and the project as a whole should take no more than two weeks to complete. Begin with the workplace scenario, and then continue to Step 1, “Create a Network Architecture Overview.”

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
1.4: Tailor communications to the audience.
2.1: Identify and clearly explain the issue, question, problem under consideration.
2.2: Locate and access sufficient information to investigate the issue or problem.
2.3: Evaluate the information in logical manner to determine value and relevance.
2.4: Consider and analyze information in context to the issue or problem.
2.5: Develop well-reasoned ideas, conclusions, checking against relevant criteria.
5.3: Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.
8.1: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.
8.2: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately.
8.4: Possess knowledge of proper and effective communication in case of an incident or crisis.
8.5 Obtain knowledge and skills to conduct a postmortem analysis of an incident and provide sound recommendations for business continuity.
9.1: Knowledge of the Information Technology industry, its systems, platforms, tools, and technologies.

Looking for Discount?

You'll get a high-quality service, that's for sure.

To welcome you, we give you a 15% discount on your All orders! use code - ESSAY15

Discount applies to orders from $30
©2020 EssayChronicles.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.