Describe the data you collected and how it can be used to identify threats to your network.

One of the fundamental methods used by IT professionals to identify threats against a network is to analyze network traffic. This Case Study assignment will give you some practice using one of these tools. The following articles offer an overview of various free network analysis tools. Take some time to review the available tools and select one of them for this assignment.

Chickowski, Ericka. November 8, 2013. 10 Free Network Analysis Tools. Retrieved from http://www.networkcomputing.com/unified-communications/10-free-network-analysis-tools/d/d-id/1234534?page_number=1

Wallen, Jack. January 29, 2013. Five free network analyzers worth any IT admins time. Retrieved from http://www.techrepublic.com/blog/five-apps/five-free-network-analyzers-worth-any-it-admins-time/

Tabona, Andrew. July 23, 2013. The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins. Retrieved from http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/

Gizmos. November 2013. Best Free Network Analysis Tools. Retrieved from http://www.gfi.com/blog/the-top-20-free-network-monitoring-and-analysis-tools-for-sys-admins/

Select a network traffic analysis tool after reviewing the resources in the Case Assignment Overivew. Suggested tools include Microsoft Network Monitor (http://www.microsoft.com/en-us/download/details.aspx?id=4865), Capsa Free (http://www.colasoft.com/capsa-free), and WireShark (https://www.wireshark.org/download.html), although you can select any other tool you feel is worthwhile for the assignment.
Gather some data from your home network using the selected tool. You may not have a network, but you will still be able to gather data from your computer, the connection to the Internet, and the associated traffic.
Write a paper summarizing your results that addresses the following:
Describe the tool you selected and why you selected this tool.
Describe the data you collected and how it can be used to identify threats to your network.
Include a summary of the data and screen shots of the tool in use.
Include a title page.
Cite all sources and provide a reference list at the end of your paper.
Paper should be 3-4 double-spaced pages,excluding the title and reference pages.
The paper will be assessed on your ability to consolidate ideas from your research and your understanding of the materials.