Proper network design provides for compliant security, not only isolating users and their traffic, but also preventing attackers from easily traversing a network. Using Microsoft Visio or another onli
In this assignment, students will quantify a network in order to map it, ensure everything in the system is reporting correctly, and demonstrate one of the first steps a hacker would take to try to gain access to the system.
Using NMAP, quantify a home or work network. Refer to the Internet to provide guidance on the installation and configuration of NMAP. Then, identify the following:
The number and type of systems attached to the network (e.g., servers, cameras, workstations, mobile devices, security cameras, and so forth)
What is on the network
Who is on the network
The acceptable use policy or, for a workplace, the policy put out from the company
Compile your findings including screenshots from the NMAP program. Make sure to include the following statement from the asset owner: "Use of these assets are governed by , and ."
APA style is not required, but solid academic writing is expected.