Network Security from Hackers
A hacker attacks a network in different ways, using common protocols and applications. A proxy server can protect the identity of yoursystem from a hacker, but if a hacker connects to the proxy server, your identity would be disclosed.Based on what you have learned so far, answer the following questions:Explain at least three different protocols or applications a hacker may use to assist in an attack on a network.In what possible ways can these protocols be used to attack a network?Discuss the easiest and safest way to intrude into a network. Provide rationale to support your answer.Discuss the features of two popular proxy servers. Explain which feature makes one proxy server provide more protection over the otherand why.Describe a scenario in which you would use a particular proxy server to protect the identity of your system. Justify your choice.APA formatting




