Explain the functionality of a firewall

1. Conduct research on the Internet and write a 1 two page paper on how zero day attack vulnerabilities are discovered. Include in the paper some of the most recent zero day attacks. Also, describe how to defend against zero day attacks. Include a title page and separate references page. Follow APA guidelines. This includes in-text citations, referencing, and formatting of the pages.

2. Research the mobile device security that is available for different smartphones. Then explain which one you would recommend. Why? Prepare at least a 250-word response, and please cite your work with references. APA

3. For this reflection paper, draft a 250-word response to the following question: What are some security concerns with virtualized networks? Do you feel that a virtualized network is secure enough to host identity information (i.e., social security number, etc.)? Why, or why not? APA STLYE

4. Is car hacking a reality or a myth? Here is a short clip from the movie After the Sunset (http://youtu.be/vgIncjqT3VE)-can this really happen? From an authentication perspective, what can you do to help prevent car hacking from occurring? This exercise asks you to think critically about the authentication and account management concepts in this unit and then apply them to a potential threat such as car hacking. Prepare at least a 250-word response, and please cite your work with references. You may use the Internet to support your response. APA

5. Create a five-seven- PowerPoint Presentation on what goes in to a disaster recovery plan. Include all the units as outlined in the textbook, and explain each section of the plan. Be sure to cite any sources used in a reference slide with proper APA formatting. (The cover and reference slides do not contribute to the slide count). You may also use the slide notesfunction to explain slide content as necessary.

6. Why is it important to train employees about securitydefenses? Does training employees increase or decrease security for an organization? Explain. There is not a right or wrong answer to this question. Use your critical thinking skills to examine how training employees can impact the overall security of an organization.

7. Explain the functionality of a firewall and give an example of a firewall. 200 word response

8. Describe a Network Address Translation (NAT). Provide an example of NAT.200 word response

9. Compare and contrast Static NAT and Dynamic NAT. 200 word response

10. Explain the strengths and weaknesses of a firewall. Search for more information. 200 word response.

Order from us and get better grades. We are the service you have been looking for.