Presentation - Tool Comparison , computer science homework help


Question Description

Presentation - Tool Comparison

At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of tools and identify two specific products from different vendors. Based on two products, please research the differences and similarities between the two products. You should also evaluate the implementation issues you may face with each product. Based on your research, please create a PowerPoint or a similar presentation to explain your research and your findings of the tools. The presentation should be comparative in nature as to highlight the similarities between the two products you researched.

The presentation must contain the following:

  • Product Background
  • Pros and Cons of each product
  • Side by Side comparison
  • Recommendation

PowerPoint Requirements

  1. Easy to follow and understand
  2. Ratio of words to background (Essentially, not too many words on a slide. Highlight the essentials)
  3. Graphics – Charts, Graphs, Illustrations, etc.
  4. Other – media – Audio, Video, etc.
  5. Safe – Assignment comparison will be done

Tutor Answer

School: Cornell University


Networking Scanning Tools
Student Name
Course Name

 Network scanning is the process of identifying all users and servers on a
particular network using a network scanner software
 It involves a system that keeps track of the status of the various
elements within an organization's network
 This process can be performed by administrators and hackers who are
intending to compromise a system.
 Network scanning is a single-step operation that saves paper sheets

Importance of Network Scanning
Networking scanning can help an organization to:
 Appreciate the state of vulnerability within a network

 Identify network-wide vulnerability information quickly
 Detect unknown computers and other devices on the network
 Obtain vulnerability information about network resources that cannot install

monitoring agents such as network routers or firewalls
 Audit the vulnerability of computers against internal and external network

Types of Network Scanning Techniques

 Active Scanning
- is a process of scanning a network within an organization to establish

system inventory and vulnerabilities.
- It helps to obtain crucial information on system uptime and reliability
- When performed wrongly, its an ineffective and inefficiency way of
collecting system data

Types of Network Scanning Techniques cont’d

 Passive Scanning
- It’s a process of assessing and gathering information on a network in less

sensitive and technical manner
- It offers accurate and timely information whenever a system appears on
the network
- Passive scanners can realize a huge data about in systems via traffic flow

Types of Network Scanning Software

 They are classified into two:
 Commercial network scanners- they are purchased from various vendors

and mostly use...

flag Report DMCA

Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors