Presentation - Tool Comparison , computer science homework help

Anonymous

Question Description

Presentation - Tool Comparison

At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of tools and identify two specific products from different vendors. Based on two products, please research the differences and similarities between the two products. You should also evaluate the implementation issues you may face with each product. Based on your research, please create a PowerPoint or a similar presentation to explain your research and your findings of the tools. The presentation should be comparative in nature as to highlight the similarities between the two products you researched.

The presentation must contain the following:

  • Product Background
  • Pros and Cons of each product
  • Side by Side comparison
  • Recommendation

PowerPoint Requirements

  1. Easy to follow and understand
  2. Ratio of words to background (Essentially, not too many words on a slide. Highlight the essentials)
  3. Graphics – Charts, Graphs, Illustrations, etc.
  4. Other – media – Audio, Video, etc.
  5. Safe – Assignment comparison will be done

Tutor Answer

Dmitry
School: Cornell University

Attached.

Networking Scanning Tools
Student Name
Course Name

Definition
 Network scanning is the process of identifying all users and servers on a
particular network using a network scanner software
 It involves a system that keeps track of the status of the various
elements within an organization's network
 This process can be performed by administrators and hackers who are
intending to compromise a system.
 Network scanning is a single-step operation that saves paper sheets
chronologically

Importance of Network Scanning
Networking scanning can help an organization to:
 Appreciate the state of vulnerability within a network

 Identify network-wide vulnerability information quickly
 Detect unknown computers and other devices on the network
 Obtain vulnerability information about network resources that cannot install

monitoring agents such as network routers or firewalls
 Audit the vulnerability of computers against internal and external network
attacks

Types of Network Scanning Techniques

 Active Scanning
- is a process of scanning a network within an organization to establish

system inventory and vulnerabilities.
- It helps to obtain crucial information on system uptime and reliability
- When performed wrongly, its an ineffective and inefficiency way of
collecting system data

Types of Network Scanning Techniques cont’d

 Passive Scanning
- It’s a process of assessing and gathering information on a network in less

sensitive and technical manner
- It offers accurate and timely information whenever a system appears on
the network
- Passive scanners can realize a huge data about in systems via traffic flow

Types of Network Scanning Software

 They are classified into two:
 Commercial network scanners- they are purchased from various vendors

and mostly use...

flag Report DMCA
Review

Anonymous
Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors