In: Computer Science
Discussing - Network Security
a) Discuss the relative merits of traditional signature-based
IDS/IPS technology with newer form, such as application awareness
and anomaly detection.
b) Discuss and develop a theoretical network architecture for a small business in the area that wishes to expand into new facilities, like a colocation center in the downtown area.