Overview In this assessment, you will identify a security threat to a wireless network. You then identify which points of the network might be vulnerable and recommend policies, defenses, and practice

Running head: NETWORK SECURITY THREATS 0

Delete all yellow highlighted sections when you are finished with the paper and before turning it in. Edit the black writing with your own information for your paper to keep the correct format. Save the paper with the correct naming convention listed under the attempt section.

Network Security Threats

IT-FP1006 Communication Strategies for the Information Technology Professional

Learner’s Name

Capella University

Professor’s Name

Month Year

Network Breach

Insert the original diagram here and show on the diagram where you feel is the problem(s). If you wish, you can insert an updated diagram, if using one, showing a proper secure network layout base on the original drawing.

Briefly describe the threat, including its medium, delivery mechanism, type, typical targets, et cetera. Describe where and how it is likely to breach the identified network. Consider importing the network diagram into Visio (or other appropriate tool) and marking the incursion points that you describe. You will need to do this to achieve the distinguished level for its associated criterion. Paste the updated diagram into your assessment document. Describes where and how it is likely to breach the identified network and shows it on a diagram.

Defense Attack – [Name of attack]

Describes a typical defense against this type of attack in detail that demonstrates a solid understanding of the attack.

Policy to Prevent [Name of attack] Attack

Describes why a policy is an effective deterrent for preventing a specified network attack and includes a specific supporting example. Found via an Internet search.

Practices to Effectively Enforce Security Policy

Describes practices that would effectively enforce a security policy and includes supporting references from professional sources.

Characteristics of [Name of network security threat]

Describes the characteristics of a specified network security threat in great detail that includes specific perils that it poses.

Conclusion

Provides a fully convincing logical argument in support of conclusions or recommendations.

References