Advantages of logging more information to alerts file

Assignment Help Basic Computer Science
Reference no: EM1353549 , Length: 1000 Words

1. When running Snort IDS why might there be no alerts?

2. If we only went to a few web sites, why are there so many alerts?

3. What are the advantages of logging more information to the alerts file?

4. What are the disadvantages of logging more information to the alerts file?

5. What are the advantages of using rule sets from the snort web site?

6. Describe (in plain English) at least one type of ruleset you would want to add to a high level security network and why?

7. If a person with malicious intent were to get into your network and have read/write access to your IDS log or rule set how could they use that information to their advantage?

8. An intrusion prevention system can either wait until it has all of the information it needs, or can allow packets through based on statistics (guessed or previously known facts). What are the advantages and disadvantages of each approach?

9. So, the "bad guy" decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen, the system can allow all traffic through (without being checked) or can deny all traffic until the system comes back up. What are the factors that you must consider in making this design decision?

Reference no: EM1353549

Questions Cloud

What is value of price elasticity of demand for pepsi-cola : according to the midpoint formula, the value of price elasticity of demand for Pepsi-Cola.
Career aspirations in cross cultural psychology : Can you describe three specific ways that you use, in your life, and to forward yourself in your career aspirations, in Cross Cultural Psychology and what you have learned over the years pertaining to this subject asked?
Determine the maximum amount for payment : The Bradshaw Corporation's most recent dividend was $6.75. The historical dividend payment by the firm shows a constant growth rate of 5% per year.
Adjust the following graph to show the changes in the market : Adjust the following graph to show the changes in the market between 2001 and 2002.
Advantages of logging more information to alerts file : What are the advantages of logging more information to the alerts file? What are the disadvantages of logging more information to the alerts file?
Cultural limitations associated with assessment : What are at least two cultural limitations associated with assessment and treatment? Can you discuss the use or misuse of assessment instruments, therapy techniques, research results, or any other facet of clinical practice
Determine the current yield or cost of preferred stock : Ten years ago, Stigler Corporation issued $100 par value preferred stock yielding 8 percent. The preferred stock is now selling for $97 per share.
Statements that make variable-s field-s values consistent : Write one or two statements that make this variable's field's values consistent with the mathematical notion of "origin".
Calculate annual interest rate : A man walks into a New York City bank and asks for a $5000 loan; provide his Ferrari, worth $250,000 as collateral. He says loan  officer that he requires the money for two weeks for an important venture.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Relationship between certifications and performance

Describe the relationship between certifications and performance? What does "performance" mean and how do you measure it?

  Prediction for open standards that may change world again

In April of 1990, entire concept of domain was born, and email addresses "opened up". What might be the prediction about more open standards which may change our world again?

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

  Explaining threat category

An individual threat can be represented in more than one threat category. If a hacker hacks into a network, copies a few files.

  It solution to utilize as a strategic weapon

Why is it so imperative for an organization, regardless of size, to explain a Business Model, and then look for which IT solution to utilize as a strategic weapon?

  Average memory access time for load data

Compute the average memory access time for load data reference in this new con?guration?

  Describing targeted audience go for particular site

Recognize a particular website that you frequently go to and explain targeted audience that goes to that particular site. Do not say "everyone" since all sites always have general target audience.

  Probability of exactly k collisions and then success

Large population of ALOHA users manage to create 50 requests/sec., including both originals and retransmissions. Time is slotted in units of 40 msec. Compute the probability of exactly K collisions and then a success?

  Enforcing mandatory access control environment

Users dont seem to understand that they need to handle certain documents with more care and control than others. Which of the following will improve this situation?

  Turing machine that decreases positive binary number by one

Write a Turing machine that decreases a positive binary number by one? By writing turing machine an instruction set in the form of (w,x,y,z,a) where w is current state,

  Benefits of binary file called registry

Write down the benefits and disadvantages of configuration in binary file called registry.

  Importance of chain of custody in case of computer forensics

Explain importance of chain of custody in the case of computer forensics. You may show your viewpoint by giving examples showing that "common beliefs".

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd