Introduction to Cyber Defense

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Write a 2–3 page paper that covers the following:

  • What are the types of risks to trusted networks that must be mitigated by security professionals with the goal of securing internal information assets?
  • What role does monitoring the external borders or edges of the trusted network play in supporting the security of internal information assets?
  • What are some of the tools that are available to security professionals interested in evaluating the contents of packets trying to gain entry into their trusted networks?
  • What role does security policy play in securing the external borders or edge of the trusted network?

Assignment Requirements

  • Written communication: Written communication is free of errors that detract from the overall message.
  • APA formatting: Resources and citations are formatted according to APA (sixth edition) style and formatting.
  • Length of paper: 2–3 pages, excluding the references page.
  • Font and font size: Times New Roman, 12 point.
Scroll to Top