Discuss the monitoring zones

Assignment Help Management Information Sys
Reference no: EM131940502

Task 1:

Instructions: Add additional insight opinions or challenge opinions and you can visit a couple of the web sites contributed and share your opinion of these sites. Minimum of 150 words for each.

1) Full content data is information based on that network that allows analysts to derive session, alert, and statistical data (Bejtlich, 2005).

It offers both granularity as well as application relevance which makes its collection meaningful (Bejtlich, 2005). To obtain full content data, there are security monitoring products at play.

When discussing security monitoring products, it is important to discuss the monitoring zones. "Monitoring zones are locations where the traffic in those areas shares certain privileges, based on the level of trust afforded by a security engineer" (Bejtlich, 2005, p. 45). According to Bejtlich (2005), there are four of these zones, or considerations. They are the perimeter, the demilitarized zone, the wireless zone, and the intranet. The perimeter is where sensors are typically deployed (Bejtlich, 2005).

This is due to the fact that it receives the most visibility from class 1 attackers (Bejtlich, 2005). However, it is the most untrusted zone because of the vulnerability associated with the lack of control (Bejtlich, 2005). The demilitarized zone (DMZ) is another area where sensors are frequently deployed (Bejtlich, 2005). It includes the DMZ switch and firewall (Bejtlich, 2005).The wireless zone is all machines that have wireless connectivity (Bejtlich, 2005).

It includes the wireless network and wireless access point firewall (Bejtlich, 2005). The intranet is another zone where sensors can be deployed, even though the perimeter and demilitarized zone are the preferred zones (Bejtlich, 2005). Intranet sensors experience a lot of traffic (Bejtlich, 2005). This could be why the intranet is monitored by practitioners via the internal networks as well as the critical internal hosts (Bejtlich, 2005).

Reference

Bejtlich, R. (2005). Security monitoring: Beyond intrusion detection [E-Reader Version]. Retrieved from The Tao of Network Security Monitoring

2) If any business entity does not know what's happening on their networks it probably means they are always going to be way behind the curve when it comes to attacks.

That is where security monitoring products having full content data comes into play which will be very beneficial to analyze when and what is happening within their network which can help to decide what to do about them. Having full content data or capturing full packets provide the most flexibility and granularity when analyzing network-centric data.

Addition to collecting the full content data, it is imperative to collect the data where analyst can see the true internet destination IP address for traffic of interest, and where you can see the true internal source IP address for traffic of interest (Bejtilch, 2012). However, for some of the businesses there could become issue of disk storage when capturing full content data of the network and it can add increase the cost to the business.

In addition, disk might not be able to capture full content of aggregating traffic and ensuring that all data have been captured without significant loss at line speed can be difficult.

With that in mind, at the beginning it would be much easier to get started monitoring only HTTP or DNS and prioritize some of the network segments such as those with PII, those that require PCI compliance, or any other important network which is critical from business perspective.

In addition, by capturing data of some of the critical piece of network netflows will indicate if there is any problem and it will come to know if additional information is needed to monitor by capturing additional data of networks.

Number of Pages: 1 Page

Page Line Spacing: Double spaced (Default)

Academic Level: College

Paper Format: APA

Task 2

Instructions: Use examples from the readings, or from your own research, to support your views, as appropriate. Encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end. References must be in APA citation format.

A minimum of 250-300 words.

Describe and interpret the deployment considerations involved with using network security monitoring products to obtain full content data.

Number of Pages: 1 Page

Page Line Spacing: Double spaced (Default)

Academic Level: College

Paper Format: APA

Reference no: EM131940502

Questions Cloud

Summarize the content of the reading assignment : Summarize the content of the reading assignment and raise two or more substantially critical questions or substantial reactions to the reading of the day.
Create the plan to assemble a team : In creating the recommendation, evaluate each role selected, documenting the value that the team member will bring to the process.
How did life change after the industrial revolution : How did life change after the Industrial Revolution? Make a second list describing the ways that life was different after industrialization.
Describe steps for designing an effective training program : Describe the four steps for designing an effective training program (needs assessment-design-implementation-evaluation). Explain how each step works.
Discuss the monitoring zones : When discussing security monitoring products, it is important to discuss the monitoring zones. "Monitoring zones are locations where the traffic in those areas.
Discuss the wartime leadership styles of the men leading : Discuss the wartime leadership styles of the men leading three of these countries-Germany, the Soviet Union, Britain, the United States, and Japan.
Analyze the development of tort law : Analyze the development of tort law from the concept and degree of negligence to the application of the law to strict / product liability.
Discuss the components of hr planning and technology : Human Resources has faced and continues to face an assortment of changes within its own functions. As a result, careful planning is needed to establish changes.
Describe the behaviors of the sales force : HRM 533 Describe the behaviors of the sales force that are targeted with the compensation plan. Assess how a value proposition is achieved for current.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd