“INTERNATIONAL BUSINESS ETHICS” on this key term conduct a search online Library resources to find 1 recent peer-reviewed academic journal article (within the past 3 years) that closely relate to

After reading this week's materials, please respond to one or more of the following questions.

1.Describe the functions of hubs/repeaters, bridges, switches, routers, and gateways. At what layers of the OSI model does each device operate?

2.Describe the following types of network attacks: denial of service (and DDoS), malformed packet attacks, flooding, sniffing, Ransomware, DNS hijacking, and drive-by download. Give an example of a DoS or DDoS attack and describe how it overwhelms a target system.

3.Depending on their needs and budget, companies can choose from a variety of perimeter security options. Discuss the differences between packet-filtering, stateful inspection, proxy, dynamic packet filtering, kernel proxy, and next generation firewalls and how they provide security filtering to protect the perimeter.