Overview on ids and ips or honeypot

Assignment Help Management Information Sys
Reference no: EM13779562

IDS, IPS, or Honeypot currently offered by product vendors and cloud service providers. You will be making a security recommendation, related to the protection of a target network of your choice.

There are a few different paths you may take in this lab, so let's address some of the distinguishing features and definitions that are out there.

IDS and IPS Overview

An intrusion detection system (IDS) generally detects and logs known intrusions or anomalous network activity. Generally, no real-time protection actually occurs, therefore false-positives create little or no damage. Optionally, suspicious network traffic can be routed to an alternate network, such as a honeypot.

An intrusion protection system (IPS) generally detects, logs, and then blocks known intrusions or anomalous network activity. False-positives are an issue and will result in a self-inflicted denial of service condition. Optionally, suspicious network traffic can be routed to an alternate network, such as a honeypot.

Honeypot Overview

Honeypots come in several broad categories. The most common labels we apply to them are research honeypots, active honeypots, and offensive honeypots. They are designed to do what their label suggests, and here is a brief summary.

Note: Seek qualified legal advice before deploying any type of honeypot.

Research honeypots generally collect and analyze data about the attacks against a decoy-network. They can also route the attacker to new decoy-networks, to gather more details about the potential attacks. The data gathered are used to understand the attacks and strengthen the potential target networks.

Active honeypots have many of the features found in a research honeypot, but they also hold special content that, once taken by the attackers, can be used as evidence by investigators and law enforcement. For example, active honeypots may have database servers containing a fake bank account or credit card information.

Offensive honeypots are configured with many of the features of the active honeypots, with one interesting and dangerous addition: they are designed to damage the attacker. When used outside of your own network, this type of honeypot can result in vigilantism, attacks against false-targets, and may result in criminal charges against the honeypot operators. Offensive honeypots are not recommended for non-law-enforcement organizations. However, when used fully within your own network, this technique can detect and neutralize the attacker.

Any of the above services can be implemented on a privately managed network, or through a cloud service. The selection of one platform over another will generally determine where the specific protection occurs-on your network or in the cloud.

The reason for this lab is to give you an understanding of how special network technology can be used as a security research tool, while also providing varying degrees of protection.

Deliverables

Document Authoring Guidelines

Each section will vary in size based on the requirements. Drive yourself to create a useful document for the direction you have selected.

Lab Document Framework

The Target Network: Indicate the type of activities and data that it supports in a few sentences. For example, it is the website for an educational institution that holds personal academic and financial information, or it is the network used to control devices in a chemical plant.

Use your imagination, but select something that is real and meaningful to you.

The Protection System: Select one from the presented list (Step 2), or choose your own protection technology, if it is highly relevant.

Reference no: EM13779562

Questions Cloud

Explain the historical and modern-day ethical issues : What are the historical and modern-day ethical issues in the law enforcement procession? How have these issues affected law enforcement personnel
Write an essay about the effects of the european union : Write an essay about the effects of the European Union. The eassay must be 3 pages " references page not included" and the essay should also mention a few causes and focus on effects and not all effects.
How might change the electronic structure : How might change the electronic structure of the ion - monoclinic crystal symmetry leads to distortion of the Y6 surrounding structure.
Quiz on psychological : Vioxx, Celebrex, and Bextra are painkillers, and all of them are risky for heart patients. It must be the case that all painkillers are risky for heart patients.
Overview on ids and ips or honeypot : IDS, IPS, or Honeypot currently offered by product vendors and cloud service providers. You will be making a security recommendation, related to the protection of a target network of your choice.
Is there any way to come to a win-win situation here : What legal options does Frank Oldburr have to get himself covered with a health plan? Is there any way to come to a win-win situation here? Explain
Write a summary of grade inflation in the college classroom : write a summary of Grade inflation in the college classroom. In the first paragraph, use several quotations to highlight the main points of the article.
Concepts of political culture and political socialization : Construct a comprehensive essay explaining how the concepts of political culture and political socialization could have possibly shaped, influence and impact the decision-making process as it relates to Dr. Ben Carson.
What is the drug enforcement administration : What is the drug enforcement administration (DEA) schedule for methamphetamine, and what category drug is it, legally? When taking a person into custody, what would make methamphetamine users different from users of other controlled substances? Why

Reviews

Write a Review

Management Information Sys Questions & Answers

  Required resources in system implementation

how do you evaluate number of required resources in system implementation

  Routing protocols and criteria

Routing protocols and criteria - Please detail the differences between cold sites, warm sites, and hot sites.

  Compare and contrast the effectiveness of classic models

Compare and contrast the effectiveness of classic models and recently evolved models such as Big Data and NoSQL. Give your opinion on which type of model is more effective and why

  Changes to a supply chain1 what independent variables

changes to a supply chain1 what independent variables should you consider when recommending changes to a supply chain

  Auditing infromation systems process powerpoint

Auditing Infromation Systems Process powerpoint based off of paper you already wrote me:it is attached to this assignment may as well use some of the references you already did plus some new ones

  Cost benefits analysis for new systemsassume that the

cost benefits analysis for new systemsassume that the benefits of a new system were to decrease the average amount of

  Describe the relations between learner and instructor

Learning Technology Relationships - summarize each by describing the relations between learner, instructor, content and other learners.

  What benefits are expected to be provided by is

Investigating Information Systems-What benefits are expected to be provided by IS

  How to create crm system flow

How to create crm system flow

  Explain the top five management concerns

Explain the top five management concerns that you believe is the most important. Then, select one out of the five most influential ITs.

  Describe argument for the hims development method

Create an argument for the HIMS development method you think would be the most effective in a health care organization. Justify your response

  Dss model management softwarebriefly explain what

dss model management softwarebriefly explain what information is provided by the dss that aid in decision making and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd