Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Task 1:

Instructions: Add additional insight opinions or challenge opinions and you can visit a couple of the web sites contributed and share your opinion of these sites. Minimum of 150 words for each.

1) Full content data is information based on that network that allows analysts to derive session, alert, and statistical data (Bejtlich, 2005).

It offers both granularity as well as application relevance which makes its collection meaningful (Bejtlich, 2005). To obtain full content data, there are security monitoring products at play.

When discussing security monitoring products, it is important to discuss the monitoring zones. "Monitoring zones are locations where the traffic in those areas shares certain privileges, based on the level of trust afforded by a security engineer" (Bejtlich, 2005, p. 45). According to Bejtlich (2005), there are four of these zones, or considerations. They are the perimeter, the demilitarized zone, the wireless zone, and the intranet. The perimeter is where sensors are typically deployed (Bejtlich, 2005).

This is due to the fact that it receives the most visibility from class 1 attackers (Bejtlich, 2005). However, it is the most untrusted zone because of the vulnerability associated with the lack of control (Bejtlich, 2005). The demilitarized zone (DMZ) is another area where sensors are frequently deployed (Bejtlich, 2005). It includes the DMZ switch and firewall (Bejtlich, 2005).The wireless zone is all machines that have wireless connectivity (Bejtlich, 2005).

It includes the wireless network and wireless access point firewall (Bejtlich, 2005). The intranet is another zone where sensors can be deployed, even though the perimeter and demilitarized zone are the preferred zones (Bejtlich, 2005). Intranet sensors experience a lot of traffic (Bejtlich, 2005). This could be why the intranet is monitored by practitioners via the internal networks as well as the critical internal hosts (Bejtlich, 2005).

Reference

Bejtlich, R. (2005). Security monitoring: Beyond intrusion detection [E-Reader Version]. Retrieved from The Tao of Network Security Monitoring

2) If any business entity does not know what's happening on their networks it probably means they are always going to be way behind the curve when it comes to attacks.

That is where security monitoring products having full content data comes into play which will be very beneficial to analyze when and what is happening within their network which can help to decide what to do about them. Having full content data or capturing full packets provide the most flexibility and granularity when analyzing network-centric data.

Addition to collecting the full content data, it is imperative to collect the data where analyst can see the true internet destination IP address for traffic of interest, and where you can see the true internal source IP address for traffic of interest (Bejtilch, 2012). However, for some of the businesses there could become issue of disk storage when capturing full content data of the network and it can add increase the cost to the business.

In addition, disk might not be able to capture full content of aggregating traffic and ensuring that all data have been captured without significant loss at line speed can be difficult.

With that in mind, at the beginning it would be much easier to get started monitoring only HTTP or DNS and prioritize some of the network segments such as those with PII, those that require PCI compliance, or any other important network which is critical from business perspective.

In addition, by capturing data of some of the critical piece of network netflows will indicate if there is any problem and it will come to know if additional information is needed to monitor by capturing additional data of networks.

Number of Pages: 1 Page

Page Line Spacing: Double spaced (Default)

Academic Level: College

Paper Format: APA

Task 2

Instructions: Use examples from the readings, or from your own research, to support your views, as appropriate. Encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end. References must be in APA citation format.

A minimum of 250-300 words.

Describe and interpret the deployment considerations involved with using network security monitoring products to obtain full content data.

Number of Pages: 1 Page

Page Line Spacing: Double spaced (Default)

Academic Level: College

Paper Format: APA

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92779158
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Management Information System

Functional vs nonfunctional requirements please respond to

"Functional vs. Nonfunctional Requirements" Please respond to the following: Explain why both functional and nonfunctional requirements are important in IT development. Include at least two (2) examples to support your a ...

Case study when ilnaz a 22 year old female originally from

Case Study When Ilnaz, a 22 year old female originally from Iran, did well in her job interview, the manager of CompuSoft, an Australian company that specialises in the design of specialised DVDs offered a job immediatel ...

Read the nationstate case study in attachment answer

Read the Nationstate Case Study in attachment. Answer Discussion Questions 1-2 at the end of the Case Study. Question 1: List the advantages of a single customer service center for RR Communications. Question 2: Devise a ...

In class we have discussed web 20 web 30 cloud computing

In class, we have discussed Web 2.0, Web 3.0, Cloud Computing, Mobile Computing, and the Internet of Things. Select an example of one of these four topics (for example, Amazon Web Services or the smart home) and discuss ...

Suppose we have the following context-free grammar which

Suppose we have the following context-free grammar which accepts a list of variable initializations. Goal ::= single | Goal single single ::= VAR "=" exp ";" exp ::= VAR | INT | exp + exp Here each V AR terminal can be m ...

Assessment instructionsbriefly detail the appropriate

Assessment Instructions Briefly detail the appropriate business requirements, IT goals, and parameters for your selected organization, and then analyze the security framework and cryptography strategies, physical network ...

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Make a power point presentation on conflict resolutionthese

Make a Power Point Presentation on Conflict Resolution. These conflicts can be work related or personal conflicts. Prepare 5 slides and make sure each slide has one academic reference. For each slide, you are only to use ...

Task description data engineering and mining the data set

Task description: Data Engineering and Mining The data set comes from the Kaggle Digit Recognizer competition. The goal is to recognize digits 0 to 9 in handwriting images. Because the original data set is large, I have ...

Discussionnbsp 300 words with 2 referencesyou have been

Discussion  : 300 Words with 2 references You have been working for four years in a bank branch located in the front section of a large grocery store. For the last two years, the branch has been underperforming and a poo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As