Describe the research methods for hardening pfsense

Assignment Help Computer Engineering
Reference no: EM132339419

Question: Research methods for hardening PFSense.

Using the virtualized PFSense system created harden the PFSense system using Snort.

1. Start the Snort service.

2. Update Snort and download the latest community rules.

3. Ensure that you have configured Snort to detect port scans.

Using the Kali VM from Topic 3, run another port scan.

Using screenshots of the results, explain if Snort detected the port scan.

Create a 300- to 500-word step-by-step instructional guide detailing how to detect scans using snort. Make sure to:

1. Explain what hardening is, what Snort does, and why it is being used in this scenario.

2. Explain any other methods by which PFSense can be hardened.

3. Include at least five screenshots.

Reference no: EM132339419

Questions Cloud

Advantages of e-commerce and m-commerce to businesses : Question-What are the advantages of e-commerce and m-commerce to businesses?
Pertinent to the next person reading your file : Comments at the top of the code in the header should include the name of java assignment, your full name, and Week 2. You are welcome to add additional
How technology infrastructure should be assessed : Each part of the technology infrastructure should be assessed for its risk profile. From that assessment, a determination should be made to effectively.
Compile and test a class that displays full name : Write, compile and test a class that displays full name, real or fictional e-mail address, and the phone number of any Pizza delivery place in West Virginia on
Describe the research methods for hardening pfsense : Research methods for hardening PFSense. Using the virtualized PFSense system created harden the PFSense system using Snort.
What are some of the steps that an organization : What are some of the steps that an organization can take to ameliorate the distress and losses suffered by its employees when there has been a regional major
What is the basic gradient descent algorithm : What is the basic Gradient descent algorithm and how do you apply it to simple example?
Technologies there are several different typologies : When looking at networking technologies there are several different typologies. What is the difference between LAN, MAN and WAN technologies?
What must companies focus on in today business environment : What must companies focus on in order to survive in today's business environment? Use at least two unique references. Length: 2-3 paragraphs.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd