Computer and Network Security
Report no. Two
In this report you are expected to research network security audit tools and investigate
one that can be used to identify host or network device vulnerabilities. Fill in the
report below based on your findings.
1. Research various security audit and network attack tools
List some of the tools that you identified in your research
2. Fill in the following form for the security audit or network attack tool
selected.
Developer:
Type of tool:
Used on(network device or
computer host):
Description of key features and capabilities of product or tool
References and info links:
3. Reflection
a. What is the frequency of network attacks and what is their impact on the operation of an
organization? What are some key steps organizations can take to help protect their
networks and resources?
b. Have you actually worked for an organization or know of one where the network was
compromised? If so, what was the impact to the organization and what did it do about
it?
c. What steps can you take to protect your own PC or laptop computer?