Discussion: Detecting Rogue Devices and Malicious Connections

Increasingly, network scanning is becoming a cyclic process, primarily due to a finite amount of time to perform a network security assessment exercise. Until you test your systems from every possible angle, you simply cannot say with reasonable certainty just where things stand with security. The end goal of a successful network scan is locating rogue devices and malicious connections on the network to determine if they present a threat. For your main post, identify one of the items listed below and provide a high-level overview of the scanning process you would apply in completing a network scan for this situation. Be sure you address the scanning process, describe what you are looking for, and conclude with a summary of actions that need to be considered if a rogue device or malicious connection is detected.

  • User device tracking on a local area network
  • Unsecured/open WI-FI
  • Open port detection
  • Bluetooth devices
  • Mobile/wireless devices

NEED A CUSTOMIZED PAPER ON THE ABOVE DETAILS?

Submit your order now!