In this module, you were introduced to firewalls, honeypots, and honeynets and you examined a variety of prevention techniques that can be used to stop hackers.
In this assignment, you will discuss the prevention techniques and how to implement the defense mechanism.
Note: Your response should rely upon at least two sources from professional literature—articles from peer-reviewed journals and relevant textbooks. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and use accurate spelling, grammar, and punctuation.
By Week 5, Day 3, in a minimum of 250 words, post your response to the appropriate Discussion Area. Through Week 5, Day 7, review and comment on at least two of your peers’ responses. Consider the following in your response:
Discussion Grading Criteria and Rubric
All discussion assignments in this course will be graded using a rubric. This assignment is worth 40 points. Download the discussion rubric and carefully read it to understand the expectations.