Question: 1. Research new network observation tools that use enhanced techniques, such as virtual machine-based code execution, to detect unwanted network traffic, e.g., botnet activity or
1. Research new network observation tools that use enhanced techniques, such as virtual machine-based code execution, to detect unwanted network traffic, e.g., botnet activity or malware activity that is not detectable by traditional AV. Chose an tool, IDS, IPS or other observation tool and list the vendor name, website, list of features. Discuss the advantages of this tool on network security. If you choose the same tool as another student you need to insure you have added more to the discussion about that tool for full points.
1. Locate and discuss the contents of a website that has information on network security. Choose a site you would recommend the members of your class begin to follow on a regular basis. Explain why you feel this site is one they need to follow. What does the site cover?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
