Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Designing an IDS for LedGrafix

In this lab, you'll need the work you've done for previous labs to design an IDS solution for LedGrafix, Gather your latest network diagram, and security policy. You've been designing LedGrafix's network using a distributed and layered security approach. You have also followed accepted best practices and performed important steps that are often overlooked, for ex, developing a security policy. Your security policy will continue to provide guidance as you work through this lab. Using your updated security policy that incorporates a remote access solution, you will develop an intrusion detection solution for LedGrafix's network resources.

There are several decisions you must make to design an effective IDS solution. First, you must decide what the goals are for the IDS. Next, you must determine where sensors should be deployed. Do you need a centralized or distributed design? Then you must decide what administrative tools you need and begin investigating products that provide services you need.

Please, read the following on IDS design (FILE ATTACHED).

1. Determine the goals for your IDS. Does it need to examine all traffic into or out of the network or only traffic on specific segment? Should each host be monitored or only servers or machine hosting confidential data or applications? Refer to risk analysis in your text if you need a refresher on how to determine what areas are most critical to protect or more at risk of intrusion. After you have defined your goals for the IDS, you can decide where the sensors should be developed.
2. Review your network diagram to locate all points of entry into your network. Don't forget to include remote access, dial-up, VPN, and even any deliberate administrative "back doors" you have integrated. Using a copy of your diagram, mark points of entry.
3. Locate any internal hosts that are particularly critical, such as research and development servers, database servers containing customer or employee informfation, domain controllers, global catalog servers, and so forth. Mark them on your diagram.
4. Determine which segments, switches, or routers provide access to the internal hosts noted in Step 3 and any others that serve critical or confidential areas. Mark these hosts on your diagram.
5. Use your updated network diagram to determine optimum placement of sensor. The goal is to place as few sensors as possible (to reduce deployment costs and minimize installation and administrative effort) yet still provide coverage of all critical areas. These areas warrant additional expense. Mark the location for sensor deployment on your diagram. Be sure to check them and make sure you haven't missed anything.
6. Remember to look for alert and response capabilities, and don't forget signature files and uploading.
7. Now you have the information to decide the administration tools you need. Look at your diagram again. Is there a secure server where you can install the IDS administrative application? Do you need to purchase additional hardware for IDS administration and logging?
8. Next, make a list of your needs. How many sensors do you need? How many hosts require software? What type of administrative software will you use?
9. Using the Internet or other resources, find an IDS product that meets your needs. Be sure to consider the vendor's stability and reputation, available support options, cost, and scalability. 

Task 1

prepare a management summary of the design. Your submission must include the following

1. A management summary of the IDS deployment stating what it is, where it's deployed, and how it's intended to work. Include a brief statement of how this deployment supports the standards and requirements set forth in your security policy, if applicable. This management summary should be written for a nontechnical audience and give an overview of the system
2. A network diagram showing location of software and hardware deployment.
3. Product details, including alerts and response capabilities, scalability, potential vendor and support options, and specific configuration on your network. 

When you are finished, proofread your work carefully. Name your file YourName_U3_IDS.doc and submit it below.

Task 2

Security Plan Updates

1. Update your security policy to reflect any changes to the network configuration and relevant policies, such as incident response. List contact information for the vendor and support staff and note escalation procedures, if necessary.
2. Update your network diagram to reflect the final design, location of sensors, hosts the product is installed on, server configuration, etc. Establish how and where signatures files are obtained and how software will be updated.
3. Place your updated diagram and details on new software and hardware into an Appendix in your security policy. 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9122455

Have any Question?


Related Questions in Computer Engineering

Discuss how an enterprise architecture can establish

Discuss how an Enterprise Architecture can establish governance mechanisms?

Question suppose a prolog database exists that gives

Question : Suppose a Prolog database exists that gives information about the parts in an automobile engine. Predicates of big, small, and part-of are included. a. Write a query to find all small items that are part of ot ...

Question you will submit a business case proposal which is

Question: You will submit a Business Case Proposal, which is a summary of your selected business case for the course project. The business case proposal will be submitted as a Word document and in paragraph form. This bu ...

Suppose that the demand curve for tickets to see a football

Suppose that the demand curve for tickets to see a football team play a game is given by Q = 80,000 - 40P and marginal cost is zero. The team's stadium can host 75,000 fans. 1) How many tickets would the team sell if it ...

Garber and skinner suggest that the large per capital

Garber and Skinner suggest that the large per capital health spending in the US (and relatively low returns to health) are due to productive and allocative inefficiencies. Which inefficiency (if either) do you think char ...

Quesiton an important principle in information security is

Quesiton: An important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense in depth. 1) Please explain the concept of layers of security. 2) ...

Williamnbspis interested in knowingnbspwhether or not

William is interested in knowing  whether or not athletics from his team have lower satisfaction with their team on a survey than the known population average survey score of 19  and the known population survey standard ...

You have requested to develop a program that will record

You have requested to develop a program that will record and process the rainfall totals of a 12 month period. You would use an array to store each month's total. Once all 12 months amounts are entered then your solution ...

Given that many new business fail in the first few years

Given that many new business fail in the first few years, how should an entrepreneur think about the risk of failure associated with a new business from what you have learnt? what an entrepreneur do to increase the chanc ...

Recommend a mechanism that will record event data on the

Recommend a mechanism that will record event data on the folders for each department. What events should be logged and how often do these logs need to be reviewed? Recommend an implementation for antivirus software. Sugg ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As