Use the network diagram and do not plagiarize!!!!!!!
1. Briefly describe the threat, including its medium, delivery mechanism, type, typical targets, et cetera. Describe where and how it is likely to breach the identified network. Consider importing the network diagram into Visio (or other appropriate tool) and marking the incursion points that you describe. You will need to do this to achieve the distinguished level for its associated criterion. Paste the updated diagram into your assessment document. Describes where and how it is likely to breach the identified network and shows it on a diagram.
2. Defense Attack – [Name of attack]
Describes a typical defense against this type of attack in detail that demonstrates a solid understanding of the attack.
3. Policy to Prevent [Name of attack] Attack
Describes why a policy is an effective deterrent for preventing a specified network attack and includes a specific supporting example. Found via an Internet search.
4. Practices to Effectively Enforce Security Policy
Describes practices that would effectively enforce a security policy and includes supporting references from professional sources.
5. Characteristics of [Name of network security threat]
Describes the characteristics of a specified network security threat in great detail that includes specific perils that it poses.
6. Conclusion
Provides a fully convincing logical argument in support of conclusions or recommendations.