In this module, you were introduced to firewalls, honeypots, and honeynets and you examined a variety of prevention techniques that can be used to stop hackers.
In this assignment, you will discuss the prevention techniques and how to implement the defense mechanism.
Tasks:
- Choose one of the three prevention techniques and discuss how the technique works.
- Discuss how a company would implement your chosen defense technique.
Note: Your response should rely upon at least two sources from professional literature—articles from peer-reviewed journals and relevant textbooks. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and use accurate spelling, grammar, and punctuation.
Submission Details:
By Week 5, Day 3, in a minimum of 250 words, post your response to the appropriate Discussion Area. Through Week 5, Day 7, review and comment on at least two of your peers’ responses. Consider the following in your response:
- Provide a statement of clarification or a point of view with rationale.
- Challenge a point of discussion or draw a relationship between one or more points of the discussion.
Discussion Grading Criteria and Rubric
All discussion assignments in this course will be graded using a rubric. This assignment is worth 40 points. Download the discussion rubric and carefully read it to understand the expectations.