Case Project 11-1: Border LocationsCreate a document that explains network border to the judges and the border points you plan to examine for security?
A border in the network world is normally established by networks, for example a home network will have its own borders.
A network here in the court house will have its own borders. Outside of the borders is a public network and that is normally the internet. Border gateways will be used to give permissions to who or what enters and leaves the network.[Mic1324]
Case Project 11-2: Preparing a Seminar About Attacks
Short Seminar for the court employees regarding malicious attacks
A malicious attack is placed by someone who wants to gain access into your network either a portion of it, or the whole thing. Software is placed inside and given instructions on what to do. [How16]The types of attacks are listed below:
https://www.solvedcollegepapers.com/product/cmit-130-cmit130-cmit-130-hs
https://www.solvedcollegepapers.com/product/cmit-140-cmit140-cmit-140-we