Reference no: EM132137997
Discussion : A Network-Based Intrusion
Imagine you live by yourself on a quiet street. Each day, you leave your house in the morning and drive to work. One day while you are at work, someone breaks into your house by kicking in your front door. When you come home later, you can immediately see that someone has forcibly entered your house.
But what if the burglar had been more subtle and had picked the lock instead, re-locking the door before leaving? At first, you might not know you had been robbed.
But once you did, you might feel really uncomfortable with the idea that someone could enter your home without breaking a window or kicking in a door. For peace of mind, you probably would have an alarm system installed.
A network-based intrusion detection system (NIDS) is like a home's alarm system. Ideally, when someone breaks into a network that has an NIDS, an alarm is triggered. Like other important defensive tools, an NIDS is not infallible; a determined hacker always can find ways to defeat it and avoid detection.
To prepare, read the Discussion notes in the Unit 3 Notes, located in this unit's Learning Resources, and consider the following scenario:
Despite having a firewall and an NIDS, a company's systems have been hacked. Unfortunately, its network-based defensive tools did not detect the intrusion.
Evaluate the limitations of three network-based defensive tools. Based upon your evaluation, provide plausible explanations of how the hackers avoided detection.
In your posting, address the firewall and NIDS.
|
Why is the term asymmetric information
: Why is the term asymmetric information in order to understand why some people are better informed than others, and the imbalance in information affects
|
|
Describes the organization you are targeting
: You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research.
|
|
Determine the equilibrium price and quantitiy
: a) Determine the equilibrium price and quantitiy. b) Suppose a $12 excise tax is imposed on the good. Dete rmine the new equilibrium price and quantity.
|
|
What is percent of lumber from each of the three supplies
: What is the percent of clear lumber from each of the three suppliers? What is the percent of lumber from each of the three supplier.
|
|
Evaluate the limitations of network-based defensive tools
: Evaluate the limitations of three network-based defensive tools. Based upon your evaluation, provide plausible explanations of how the hackers avoided detection
|
|
What are the main things to remember about elasticity
: What are the main things to remember about elasticity, supply and demand, tax incidence, government controls on the market, and economic theories?
|
|
Write a function obenglobish that takes an english word
: Write a function obenglobish that takes an English word and returns its Obenglobish equivalent, using the translation rule given above.
|
|
How many bytes does this string take in the memory
: If a string is stored at the memory address 0 times 20008000 and the string is "Cortex-M", show the memory content in hex format starting at 0 times 20008000.
|
|
Define constructors and destructors
: Define constructors and destructors, define member functions outside of the class body, develop a copy constructor and assignment operator.
|