Answered You can hire a professional tutor to get the answer.
part 1 Use the Internet to research and explore vulnerabilities that are related to TCP/IP (transmission control protocol/Internet protocol).In a 3–5-paragraph posting, provide the following informati
part 1
Use the Internet to research and explore vulnerabilities that are related to TCP/IP (transmission control protocol/Internet protocol).In a 3–5-paragraph posting, provide the following information:
- Current vulnerabilities related to TCP/IP
- Countermeasures that address the vulnerabilities
- Recommended products for addressing TCP/IP vulnerabilities
If you have experience with TCP/IP, include your own experience and recommendations in this posting.
part 2
Choose five of the following topics related to perimeter security and prepare a 5 – 7 slide presentation on that topic. The slide presentation should contain speaker notes of at least 3 paragraphs for each slideto explain the subject further. Also, include a cover slide and a reference slide.
Choose five of the following topics for the individual portion of the project:
- State-based filters
- Border routers
- Screened subnets
- Demilitarized zones (DMS)
- Intrusion prevention system (IPS)
- Intrusion detection system (IDS)
- Proxy firewalls
- Access control list filters
- Fail safe equipment
- Equipment redundancy
The individual presentation should include the following:
- An explanation of how the security method works
- Advantages and disadvantages of the chosen security
- Trade-offs for using the specific security
- Issues that are addressed by the security method chosen