Research and study the available software and hardware techniques to deter, if not eliminate, computer systems attacks. Write a comparative discussion paper on five (5) such techniques. Deliverables: 5 double spaced page
Pay attention to the following:
Encryption techniques (DNSSEC, IPSec, PGP, S/MIME)
Techniques for fault detection, isolation and repair
Intrusion Detection and Network Forensics
Firewalls (DMZ)
Secure network infrastructure services: DNS, NTP, SNMP
Add relevant resources:
Textbook: Guides to Computer Network Security By Joseph Kizza
