Discussion on pocket analyzer and VPNs
1) examine WireShark, a well-used network-packet analyzer. For this discussion:
Define a packet analyzer and describe its use
List commonly used packet analyzers (beyond WireShark)
List best practices for analyzing packets
Describe uses (good and bad, ie. hacker) of a packet analyzer
Discuss ways you would protect your own network data from being analyzed
Ideally, attach a screen shot showing and discussing an analyzer’s use.
2) One of the ways businesses provide secure access to their network (or a subset of their network) to remote (or mobile) users is to use virtual private networks (VPNs). VPNs allow users to connect securely (over an encrypted link) to a network. For this discussion:
Define the term virtual private network
Discuss the goal(s) of a VPN
Describe different types of VPNs (hardware or software based)
Discuss how the use of a VPN may support BYOD (bring your own device)
List several commonly available (open source) VPNs
Describe best practices for using a VPN
Solution Preview
Question One
Packet Analyzer
A packet analyzer refers to a computer application that is used in the tracking, intercepting and logging to a network traffic, which passes through a digital network (Kevin, 2003). It conducts a comprehensive evaluation on the network traffic and produces a modified report that is used to help organizations in the management of their networks. A packet analyzer can also be referred to as protocol analyzer, network analyzer or a sniffer (Kevin, 2003). WireShark is an example of a network packet analyzer.
(1,007 words)