Chapter 11 Info Security Policy Manager Responsibilities Assignment
Perform exercise 3 and 4 in chapter 11. Create a list of what you consider the top 5 tools, include the info for exercise 4 plus the cost.
Consider using a table to make it easy to ready.
Exercise 3: This chapter lists five tools that can be used by security administrators, network administrators, and attackers alike. Search the Web for three to five other tools that fit this description.
Exercise 4: Using a Web browser and the names of the tools you found in Exercise 3, find a site that claims to be dedicated to supporting hackers. Do you find any references to other hacker tools? If you do, create a list of the tools along with a short description of what they do and how they work.
Please find the attached Text book (chapter 11).