Discuss the security issues surrounding the ability of users to access the network from a remote location.

Need 75 – 100 words per topic

Topic 1: Event Viewer Log Files
Examine the Event Viewer on your Microsoft® Windows® computer
(Control Panel > Administrative Tools > Event Viewer). Under
Windows Logs select the Security link. Research one of the Events under
that link (Highlight and view the Event Properties General tab and
Details tab). What does it tell you about the event? Research the Event
ID on Microsoft’s Technet™ website. Share your findings with your
classmates. Cite your resources.

Topic 2: MAC Filtering
The MAC or physical address of a computer attempting to log on to a
network can be used to restrict access. Examine this process and
identify methods used by hackers to circumvent this restriction. How do
you identify the MAC address on a system? How does a switch identify the
MAC address? Share your findings with your classmates. Cite your
resources.

Topic 3: Firewalls
Firewalls function as one or more of the following: packet filter,
proxy, stateful inspection, and application firewall. Describe the
concept of a packet filter. Discuss how you would create a rule for a
packet filter firewall to block a port or a protocol. How would you test
the rule? How would you test a stateful firewall’s rules? What tools
would you use? Explain application firewalls. Include a question for
your classmates and remember to cite your resources.

Topic 4: Intrusion Detection/Intrusion Prevention
Do some research on Intrusion Detection/Prevention Systems (IDS/IPS).
If you were attempting to protect a web server, what kind of a system
would you choose? Explain your reasoning to your classmates. Cite your
resources.

Topic 5: RADIUS
Discuss the security issues surrounding the ability of users to
access the network from a remote location. Explain the remote access
technologies, protocols, and options. Compare VPN technology to RADIUS.
Cite your resources.

Topic 6: BYOD
“Bring your own device” has recently been a topic of conversation in
the security community. What is it and what does it have to do with
authentication? Why is it critical for IT managers to recommend security
policies to manage it? Do some research and summarize your thoughts on
how you would approach this issue. What security policies would you
implement for BYOD? And why is Social Media a factor? Cite your
resources.

Last Completed Projects

topic title academic level Writer delivered