Discussion of the issues and constraints that these laws pose to computer security experts. Relevant laws and ethical framework: Computer misuse act, copyright act and data protection act will be explored.Introduction to the broad area of computer security within the context of current legal frameworks. Building network applications creating networking software that use sockets to communicate. Application of Network Knowledge: Designing computer networks network hardware, logical and routing considerations.Networking Analysis: Analysis of network traffic Application of tools used to analyse communication on local networks, Understanding network traffic, Methods of analysing network conversations.Protocols and applications related to Application layer, Transport layer, Network layer, Data link layer, and Physical layer and their functionalities. Network models, protocols, applications: OSI model vs TCP/IP. ![]() Need for and determination of subnets and subnet masks. Class based networks, allocation of IP address and their identification. Use of MAC and IP addresses by network switches and routers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |