Network Security

To complete this assignment, you must research at least two credible or scholarly resources in addition to your course text.
You will be including revised content from this assignment as Post 6 of your Information Technology Blog final project. You may wish to review the instructions included for the Information Technology Blog in Week 5 prior to completing work on this assignment to see how it fits into your overall final project.
To complete this assignment, you will explain the importance of information and system security for individuals and organizations.
As a part of the Week 3 Traveling Through a Network discussion forum, you used ping commands to become familiar with networking. Explain the type of attack(s) that can be executed using ping commands.
In addition, select two of the following computer security incidents to discuss in more detail:
Security holes/vulnerabilitiesComputer virusesEmail spamPhishingPassword crackingSocial engineeringIn your paper
Explain why computer systems are vulnerable to each kind of threat.Describe the symptoms and damage that each breach can inflict after compromising a system.Propose at least two recommendations for protecting a computer system or network from each type of security breach.Support your statements with evidence from your sources.The Network Security paper
Must be at least 300 words in length (not including title and references pages,), double-spaced, and formatted according to APA Style (Links to an external site.) as outlined in the Writing Center’s APA Formatting for Microsoft Word (Links to an external site.) resource.Must include a separate title page with the following:Title of paper in bold fontSpace should appear between the title and the rest of the information on the title page.Student’s nameName of institution (The University of Arizona Global Campus)Course name and numberInstructor’s nameDue dateMust utilize academic voice. See the Academic Voice (Links to an external site.) resource for additional guidance.Must use at least two credible and/or scholarly sources in addition to the course text.The Scholarly, Peer-Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source.To assist you in completing the research required for this assignment, view Quick and Easy Library Research (Links to an external site.) tutorial, which introduces the University of Arizona Global Campus Library and the research process, and provides some library search tips.Must document any information used from sources in APA Style as outlined in the Writing Center’s APA: Citing Within Your Paper (Links to an external site.) guide.(Links to an external site.)Must include a separate references page that is formatted according to APA Style as outlined in the Writing Center. See the APA: Formatting Your References List (Links to an external site.) resource in the Writing Center for specifications.