CIS377 Alaska Bible College Network Security Questions READ AND answer the following questions in the world documentations feel free to ask when it is not

CIS377 Alaska Bible College Network Security Questions READ AND answer the following questions in the world documentations feel free to ask when it is not clear.

Thanks Homework – Network Security – CIS 377
1. ‘Network security’ often used interchangeably with ‘cybersecurity’? Why? Do you agree? Why or why not – write 500 words.
2. List and describe each of the layers of the TCP/IP Model. Also list each layer in the table below.
3. List and describe each of the layers of the OSI Model.
4. What is the difference between TCP/IP and OSI models?
For each of the terms below – describe it and write it at the correct place on the table (see examples below). User your book
and/or web for resources.
5. Ethernet Cable – The physical cable used in to connect to devices in wired networks. Layer 1.
6. Optical fiber
7. WIFI
8. Radio waves
9. Packet
10. MAC
11. ARP
12. IP address
13. IP spoofing
14. ARP Cache poisoning
15. Router
16. UDP
17. SYN flood
18. Port scanning
19. Port
20. NMAP
21. Ping
22. Ping of Death
23. Firewall – An application used to filter traffic in a network. Can span layers (layers 3, 4, 5).
24. Session hijacking
25. SSL
26. TLS
27. SSH
28. HTTP
29. HTTPS
30. Digital key
31. FTP
32. IDS
33. IPS
34. Trojan horse
35. Physical security
36. Eavesdropping
37. Switch
38. Flooding attacks
39. ARP spoofing
40. WPA2
41. VLAN
42. Encryption
43. IPv4
44. IPv6
45. IPSec
46. VPN
47. Access control list
48. Segments
49. DNS
50. DNS Spoofing
51. DoS
52. ICMP
53. Malware
54. DDoS
55. Zombie
56. Botnet
57. Onion routing
58. Wireless networks function on many of the same principles discussed in class. Study
https://www.consumer.ftc.gov/articles/0013-securing-your-wireless-network and go through the steps to ensure that your
home or a friends wireless network is secure. Provide here a log of the steps you took and explain why you took them.
59. Create a brief ‘tip sheet’ to give to your friends and family on being secure on public WiFi networks (like on an airport). Along
with tips, give a small explanation on the consequences of not taking security precautions on public networks.
TCP/IP Model
Components/protocols
Physical
Ethernet cable
Vulnerabilities
Attacks

Don't use plagiarized sources. Get Your Custom Essay on
CIS377 Alaska Bible College Network Security Questions READ AND answer the following questions in the world documentations feel free to ask when it is not
Just from $13/Page
Order Essay

Purchase answer to see full
attachment

superadmin

Recent Posts

Consider the following information, and answer the question below. China and England are internation

Consider the following information, and answer the question below. China and England are international trade…

4 years ago

The CPA is involved in many aspects of accounting and business. Let’s discuss some other tasks, othe

The CPA is involved in many aspects of accounting and business. Let's discuss some other…

4 years ago

For your initial post, share your earliest memory of a laser. Compare and contrast your first percep

For your initial post, share your earliest memory of a laser. Compare and contrast your…

4 years ago

2. The Ajax Co. just decided to save $1,500 a month for the next five years as a safety net for rece

2. The Ajax Co. just decided to save $1,500 a month for the next five…

4 years ago

How to make an insertion sort to sort an array of c strings using the following algorithm: * beg, *

How to make an insertion sort to sort an array of c strings using the…

4 years ago

Assume the following Keynesian income-expenditure two-sector model:

Assume the following Keynesian income-expenditure two-sector model:                                                AD = Cp + Ip                                                Cp = Co…

4 years ago