Question: 1. Research new network observation tools that use enhanced techniques, such as virtual machine-based code execution, to detect unwanted network traffic, e.g., botnet activity or

1. Research new network observation tools that use enhanced techniques, such as virtual machine-based code execution, to detect unwanted network traffic, e.g., botnet activity or malware activity that is not detectable by traditional AV. Chose an tool, IDS, IPS or other observation tool and list the vendor name, website, list of features. Discuss the advantages of this tool on network security. If you choose the same tool as another student you need to insure you have added more to the discussion about that tool for full points.

1. Locate and discuss the contents of a website that has information on network security. Choose a site you would recommend the members of your class begin to follow on a regular basis. Explain why you feel this site is one they need to follow. What does the site cover?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!