Section outline

    • Opened: Tuesday, 16 September 2025, 12:00 AM
      Due: Wednesday, 3 December 2025, 11:59 AM

      Topic 4: Network security

      • Authentication
      • Encryption
      • Firewalls
      • Intrusion detection
      • Vulnerability assessment

      Note: From all your findings, case study examples MUST be included that are geared towards computer networks for organizations or corporations.