What can be done to attract intruders and keep them connected to the network long enough to trace them.

Task 1: What can be done to attract intruders and keep them connected to the network long enough to trace them. 

Task 2: The report should discuss the pros and cons of using this strategy and mention any legal issues the company might face.

Task 3: Include your recommendations for configuring or revamping the network to defend against four types of threats.

Task 4: The report must mention standard tools, security devices and software packages to be used.

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: