200 words (or more) for each of the two topics.

One trusted scholarly resource with APA in text citation and reference per topic.

Coherent response demonstrating understanding of concepts and written in correct English grammar.


1. Top Ten Attacks

From the list below, pick the four most significant attacks you will consider in protecting the WWTC (company case study attached) network security design. Create High Level Security policies and describe mitigation technologies.

Medium Network Campus Top 10 Attacks


Identity spoofing

Virus/worm/Trojan horse

Rogue devices


Man-in-the-middle (MITM)

War dialing/driving

Direct access

ARP redirection/spoofing

Remote control software

Buffer overflow

2. Wireless Security Breach

Research a case that has been in the news in the last few years where a major security breach occurred on a wireless network. Find a case where attackers got in via the wireless network, but then penetrated farther into the network, resulting in severe damage. Write two or three paragraphs about what you found.

Leave a Reply

Your email address will not be published. Required fields are marked *