Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

IDS, IPS, or Honeypot currently offered by product vendors and cloud service providers. You will be making a security recommendation, related to the protection of a target network of your choice.

There are a few different paths you may take in this lab, so let's address some of the distinguishing features and definitions that are out there.

IDS and IPS Overview

An intrusion detection system (IDS) generally detects and logs known intrusions or anomalous network activity. Generally, no real-time protection actually occurs, therefore false-positives create little or no damage. Optionally, suspicious network traffic can be routed to an alternate network, such as a honeypot.

An intrusion protection system (IPS) generally detects, logs, and then blocks known intrusions or anomalous network activity. False-positives are an issue and will result in a self-inflicted denial of service condition. Optionally, suspicious network traffic can be routed to an alternate network, such as a honeypot.

Honeypot Overview

Honeypots come in several broad categories. The most common labels we apply to them are research honeypots, active honeypots, and offensive honeypots. They are designed to do what their label suggests, and here is a brief summary.

Note: Seek qualified legal advice before deploying any type of honeypot.

Research honeypots generally collect and analyze data about the attacks against a decoy-network. They can also route the attacker to new decoy-networks, to gather more details about the potential attacks. The data gathered are used to understand the attacks and strengthen the potential target networks.

Active honeypots have many of the features found in a research honeypot, but they also hold special content that, once taken by the attackers, can be used as evidence by investigators and law enforcement. For example, active honeypots may have database servers containing a fake bank account or credit card information.

Offensive honeypots are configured with many of the features of the active honeypots, with one interesting and dangerous addition: they are designed to damage the attacker. When used outside of your own network, this type of honeypot can result in vigilantism, attacks against false-targets, and may result in criminal charges against the honeypot operators. Offensive honeypots are not recommended for non-law-enforcement organizations. However, when used fully within your own network, this technique can detect and neutralize the attacker.

Any of the above services can be implemented on a privately managed network, or through a cloud service. The selection of one platform over another will generally determine where the specific protection occurs-on your network or in the cloud.

The reason for this lab is to give you an understanding of how special network technology can be used as a security research tool, while also providing varying degrees of protection.

Deliverables

Document Authoring Guidelines

Each section will vary in size based on the requirements. Drive yourself to create a useful document for the direction you have selected.

Lab Document Framework

The Target Network: Indicate the type of activities and data that it supports in a few sentences. For example, it is the website for an educational institution that holds personal academic and financial information, or it is the network used to control devices in a chemical plant.

Use your imagination, but select something that is real and meaningful to you.

The Protection System: Select one from the presented list (Step 2), or choose your own protection technology, if it is highly relevant.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91349723
  • Price:- $35

Guranteed 24 Hours Delivery, In Price:- $35

Have any Question?


Related Questions in Management Information System

Reply 1making sense of facts numbers and measurements is a

Reply 1 Making sense of facts, numbers, and measurements is a form of art - the art of data visualization. There is a load of data in the sea of noise. To turn your numbers into knowledge, your job is not only to separat ...

Discussion briefly describe three 3 types of errors that

Discussion : Briefly describe three (3) types of errors that can occur in JavaScript. Determine which error you believe to be the most difficult to debug. Provide one (1) example of the error you believe to be the most d ...

Quantum cryptographyin this essay you will explain how

Quantum Cryptography In this essay, you will explain how quantum cryptography works and what role you think it will play in the future of cryptography. You will also provide a table that differentiates between traditiona ...

In a three-page well-written page answer the following

In a three-page, well-written page answer the following question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constant ...

Part 1 200-250 words with referencesprovide an example of a

Part 1: 200-250 words with references Provide an example of a data warehouse model defining the grain, dimensions and facts of the data warehouse. Part 2: 200-250 words with references Identify the importance of selectin ...

Assignment project deliverable project plan inceptionthis

Assignment Project Deliverable : Project Plan Inception This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this ...

Assignmentthere have been more than a few newsworthy

Assignment There have been more than a few newsworthy failures to succeed relating to the implementation of enterprise resource planning systems (ERP) that resulted in lawsuits between companies and contracted solution p ...

Assignmentpart 1 research and detail an example of how you

Assignment Part 1: Research and detail an example of how you would for steganography to hide a message. Would you use a picture, video, audio message? Explore and select one method and detail in 1 page with figure, pictu ...

Part 1 150-200 words with referencesplease describe a few

Part 1: 150-200 words with references Please describe a few differences between fact tables and dimension tables. In what case(s) might they be used interchangeably? Part 2: 150-200 words with references Why is it import ...

Assignment 1 write a 175- to 265-word response to the

Assignment 1 Write a 175- to 265-word response to the following: What circumstances should be present (or what considerations should be made) before removing a child from the guardianship of a parent? Assignment 2 Select ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As