Writing Assitance help needed 

 For Chapter 3

  • The processes for managing and responding to security advisories within your organization
  • Which organizations produce security advisories
  • What a zero-day alert is and how you should respond
  • Best practices for handling updates
  • Define an Access Control List (ACL) and how to use one within a networking environment

For chapter 5

1. What are the six security design concepts you should consider when looking at the security technologies for securing your network?

2. What rule is always implicitly present at the end of every packet filter?

3. When a device performs stateful packet inspection, what characteristics in a packet’s header are inspected, and why are they important?

4. What are some limitations of stateful packet inspection?

5. Define the differences between public and private IP addresses.