Create the necessary ruleset to use within snort to fire

Assignment Help Management Information Sys
Reference no: EM131911318

In previous parts of the course we have looked at network packet capture and packet analysis, rule writing in Snort, and the functions of the IDS detection engine, all while consistently tracing back to the security requirements and objectives that we're trying to achieve in the first place.

Over the last two weeks we focused in our readings on specific ways in which network and hostbased IDS tools could be used to identify different threats, look for interesting events, or monitor types of behavior.

Your second lab assignment asks that you apply both your technical knowledge and your practical knowledge of IDS in order to come up with a way to monitor for a specific type of behavior. This assignment is also intended in part to highlight the potential for effective use of NIDS tools for detecting internal threats, despite the fact that some of your reading has suggested NIDS is poorly suited for this type of task.

The Scenario:

Assume that you are a security analyst working for a medium-sized company where many employees use computers connected to the  Internet (as well as to the internal company LAN of course) as part of their daily job functions.

Your company has implemented an acceptable-use policy for all employees that includes a general prohibition on using company computing resources to conduct inappropriate activities, such as downloading copyrighted music and videos, participating in online gambling, visiting "adult-oriented" web sites, and posting sensitive company information to blogs, message boards, or similar sites.

Your company is considering deploying content-filtering software to help enforce this policy, but is not sure whether the cost and potentially over-broad restrictions imposed by the software would be justified.

As a knowledgeable security analyst, you voice an educated opinion that you can use Snort, the company's chosen NIDS tool, to help monitor network activity and provide information that might support a decision about whether content filtering software is  warranted.

The Assignment:

Pick a web site that fits one or more of the prohibited categories above (or something similarly likely to fall on the wrong side of "acceptable use"), and create the necessary ruleset to use within Snort to fire an alert whenever an attempt is made to connect to, access, browse, or otherwise visit the site you have chosen.

Stated simply, you want to be alerted if any internal network user tries to access the site you have chosen.

Set up your ruleset and your Snort configuration to load the rule in Snort. Then, with Snort running and including your ruleset, open a browser and visit the prohibited site you have chosen. Verify that your rule fires when this happens. Your completed lab assignment should contain the following:

1. The "unacceptable" site you selected.

2. The ruleset created to detect attempts to visit the site.

3. The Snort output produced when the rule fired and the alert was generated (a screenshot of the terminal window showing Snort running with console output or a copy of the ASCII log file is sufficient).

Reference no: EM131911318

Questions Cloud

Compare and contrast a business case and a business plan : Compare and contrast a Business Case and a Business Plan. Include definitions and applications. Also please explore business case templates.
What is marc and michelles adjusted gross income : What is Marc and Michelle's adjusted gross income? What is Marc and Michelle's taxable income? What is Marc and Michelle's taxes payable or refund due?
Prepare all the necessary journal entries for acme : Prepare all the necessary journal entries for ACME in 2011, 2012, 2013 and 2014 regarding its investment in AJAX if ACME has no significant influence over AJAX
Analyze how are your company faring compared to the industry : Analyze How are your company faring compared to the industry? To its competitor(s)? Describe your company's financial performance relative to the industry.
Create the necessary ruleset to use within snort to fire : Assume that you are a security analyst working for a medium-sized company where many employees use computers connected to the Internet.
Succeed in a training program : Explain how you would determine whether employees had the reading level necessary to succeed in a training program.
What events led to the us federal reserve : What events led to the US Federal Reserve adopting this practice and what are the differences between the three rounds of quantitative easing (QE)?
Fuel shortage slows india economic growth : India has struggled to provide enough electricity to power its industry. New power stations have been built but the country cannot get enough fuel
What is marcs average tax rate : Marc, a single taxpayer, earns $60,000 in taxable income and $5,000 in interest from an investment in city of Birmingham Bonds. What is his average tax rate?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd