Task 1: What can be done to attract intruders and keep them connected to the network long enough to trace them.
Task 2: The report should discuss the pros and cons of using this strategy and mention any legal issues the company might face.
Task 3: Include your recommendations for configuring or revamping the network to defend against four types of threats.
Task 4: The report must mention standard tools, security devices and software packages to be used.