After conducting a thorough security test on the Alexander Rocco network, you have identified several intrusion attempts from sources over the Internet. The hackers haven’t gained access to the internal network yet, but you’re concerned that it’s only a

Task 1: What can be done to attract intruders and keep them connected to the network long enough to trace them. 

Task 2: The report should discuss the pros and cons of using this strategy and mention any legal issues the company might face.

Task 3: Include your recommendations for configuring or revamping the network to defend against four types of threats.

Task 4: The report must mention standard tools, security devices and software packages to be used.


Is this part of your assignment? ORDER NOW