Write a 500-word analysis with two high quality sources (no Wikis, blogs, or anonymously authored articles) on the following scenario. You have been hired as a consultant to secure all network devices for a large firm. To do this, you must first understand what devices exist.
Describe the steps and tools you would use to discover the network devices. Explain how you would ensure that your discovery of network devices is complete. For example, will you just scan the network using NMAP, and leave it at that? How will you ensure that the discovery accounts for all devices throughout the organization (hint: review the 7 domains as outlined in the book). Will this ensure that the discovery is complete? How will you know there aren’t any shadow devices on your network?
2 pages not to include title and reference page APA format to include in text citation.