Evaluate the limitations of network-based defensive tools

Assignment Help Computer Engineering
Reference no: EM132137997

Discussion : A Network-Based Intrusion

Imagine you live by yourself on a quiet street. Each day, you leave your house in the morning and drive to work. One day while you are at work, someone breaks into your house by kicking in your front door. When you come home later, you can immediately see that someone has forcibly entered your house.

But what if the burglar had been more subtle and had picked the lock instead, re-locking the door before leaving? At first, you might not know you had been robbed.

But once you did, you might feel really uncomfortable with the idea that someone could enter your home without breaking a window or kicking in a door. For peace of mind, you probably would have an alarm system installed.

A network-based intrusion detection system (NIDS) is like a home's alarm system. Ideally, when someone breaks into a network that has an NIDS, an alarm is triggered. Like other important defensive tools, an NIDS is not infallible; a determined hacker always can find ways to defeat it and avoid detection.

To prepare, read the Discussion notes in the Unit 3 Notes, located in this unit's Learning Resources, and consider the following scenario:

Despite having a firewall and an NIDS, a company's systems have been hacked. Unfortunately, its network-based defensive tools did not detect the intrusion.

Evaluate the limitations of three network-based defensive tools. Based upon your evaluation, provide plausible explanations of how the hackers avoided detection.

In your posting, address the firewall and NIDS.

Reference no: EM132137997

Questions Cloud

Why is the term asymmetric information : Why is the term asymmetric information in order to understand why some people are better informed than others, and the imbalance in information affects
Describes the organization you are targeting : You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research.
Determine the equilibrium price and quantitiy : a) Determine the equilibrium price and quantitiy. b) Suppose a $12 excise tax is imposed on the good. Dete rmine the new equilibrium price and quantity.
What is percent of lumber from each of the three supplies : What is the percent of clear lumber from each of the three suppliers? What is the percent of lumber from each of the three supplier.
Evaluate the limitations of network-based defensive tools : Evaluate the limitations of three network-based defensive tools. Based upon your evaluation, provide plausible explanations of how the hackers avoided detection
What are the main things to remember about elasticity : What are the main things to remember about elasticity, supply and demand, tax incidence, government controls on the market, and economic theories?
Write a function obenglobish that takes an english word : Write a function obenglobish that takes an English word and returns its Obenglobish equivalent, using the translation rule given above.
How many bytes does this string take in the memory : If a string is stored at the memory address 0 times 20008000 and the string is "Cortex-M", show the memory content in hex format starting at 0 times 20008000.
Define constructors and destructors : Define constructors and destructors, define member functions outside of the class body, develop a copy constructor and assignment operator.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd