Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

In previous parts of the course we have looked at network packet capture and packet analysis, rule writing in Snort, and the functions of the IDS detection engine, all while consistently tracing back to the security requirements and objectives that we're trying to achieve in the first place.

Over the last two weeks we focused in our readings on specific ways in which network and hostbased IDS tools could be used to identify different threats, look for interesting events, or monitor types of behavior.

Your second lab assignment asks that you apply both your technical knowledge and your practical knowledge of IDS in order to come up with a way to monitor for a specific type of behavior. This assignment is also intended in part to highlight the potential for effective use of NIDS tools for detecting internal threats, despite the fact that some of your reading has suggested NIDS is poorly suited for this type of task.

The Scenario:

Assume that you are a security analyst working for a medium-sized company where many employees use computers connected to the  Internet (as well as to the internal company LAN of course) as part of their daily job functions.

Your company has implemented an acceptable-use policy for all employees that includes a general prohibition on using company computing resources to conduct inappropriate activities, such as downloading copyrighted music and videos, participating in online gambling, visiting "adult-oriented" web sites, and posting sensitive company information to blogs, message boards, or similar sites.

Your company is considering deploying content-filtering software to help enforce this policy, but is not sure whether the cost and potentially over-broad restrictions imposed by the software would be justified.

As a knowledgeable security analyst, you voice an educated opinion that you can use Snort, the company's chosen NIDS tool, to help monitor network activity and provide information that might support a decision about whether content filtering software is  warranted.

The Assignment:

Pick a web site that fits one or more of the prohibited categories above (or something similarly likely to fall on the wrong side of "acceptable use"), and create the necessary ruleset to use within Snort to fire an alert whenever an attempt is made to connect to, access, browse, or otherwise visit the site you have chosen.

Stated simply, you want to be alerted if any internal network user tries to access the site you have chosen.

Set up your ruleset and your Snort configuration to load the rule in Snort. Then, with Snort running and including your ruleset, open a browser and visit the prohibited site you have chosen. Verify that your rule fires when this happens. Your completed lab assignment should contain the following:

1. The "unacceptable" site you selected.

2. The ruleset created to detect attempts to visit the site.

3. The Snort output produced when the rule fired and the alert was generated (a screenshot of the terminal window showing Snort running with console output or a copy of the ASCII log file is sufficient).

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92749984

Have any Question?


Related Questions in Management Information System

Software engineeringsuppose you are writing software for a

Software Engineering: Suppose you are writing software for a radio station that manages its playlists. The program will generate candidate playlists from a record library automatically and station personnel can then chec ...

Assignment 1 question 1 -should cultures within the united

Assignment 1 Question 1 -Should cultures within the United States be expected to set aside some traditions or beliefs and integrate under a united social contract? And Why? 300 word response with 2 to 3 references Assign ...

Assignmentyour company is considering the adoption of a

Assignment Your company is considering the adoption of a rigorous form of quality management to keep projects focused on business goals. You are somewhat acquainted with a variety of approaches to quality management. You ...

Assignment application perform data gathering and

Assignment Application: Perform Data Gathering and Footprinting on a Targeted Website You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet ...

Question during the course of your employment you may have

Question : During the course of your employment you may have experienced working for both a male and female supervisor. Discuss from your personal point of view the advantages/disadvantages and like/dislike of working fo ...

Please answer both questions with 250 words or more with

Please answer both questions with 250 words or more with refs. 1. IT projects are particularly challenging as we are frequently asked for cost and time estimates before we do the Requirements Phase. Write about how IT pr ...

Case study when ilnaz a 22 year old female originally from

Case Study When Ilnaz, a 22 year old female originally from Iran, did well in her job interview, the manager of CompuSoft, an Australian company that specialises in the design of specialised DVDs offered a job immediatel ...

Ransomwareto pay or not to pay when it comes to corporate

Ransomware: To pay or not to pay? When it comes to corporate data, should corporations pay? Can you trust paying? What can be done to protect against ransomware? Would you pay if it were your own personal data? How can y ...

1discussion 1your state has a forthcoming referendum

1. Discussion 1: Your state has a forthcoming referendum concerning no smoking in public places including bars and restaurants. Follow the ten steps on page 137 on negotiation planning. 2. Discussion 2: I. Understanding ...

Suppose host a wants to send a file of size f 1500 bytes

Suppose Host A wants to send a file of size F = 1500 bytes to Host B. The path from Host A to Host B has three links having rates R 1 = 500 kbps, R 2 = 1 kbps, and R 3 = 2 Mbps, respectively. Assume there is no other tra ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As