How does the fly defeat the nests formidable defenses

Assignment Help Other Subject
Reference no: EM131186958

Assignment

Avoiding Detection

You might be familiar with carpenter ants-the ones who often bore into wood and leave little piles of sawdust everywhere. Like other ants, they are fiercely protective of their nests and actively monitor all traffic entering and leaving their network of tunnels. Although carpenter ants have many predators, few attempt to infiltrate their nests. The Microdon fly, however, is one. This fly uses an ant to smuggle its egg into the nest. Once hatched, the fly's young feeds on the ants' larvae until it emerges from the nest as an adult. How does the fly defeat the nest's formidable defenses and avoid detection? It manufactures chemicals to smell like an ant.

You might have the impression that network-based intrusion detection tools, such as network-based intrusion detection systems (NIDSs), are infallible and will sound an alarm the instant a system is compromised. You would be wrong. Like the Microdon fly, attackers are clever and can devise techniques to avoid detection once inside your system's network.

To prepare for this Discussion, locate a network-based intrusion-detection tool (other than an NIDS) on the Internet and study it thoroughly.
Critique the tool you have selected and provide two techniques that an attacker might use to avoid being detected by this tool.

Reference:

Murray, T. (n.d.). Garden friends or foes: Carpenter Ants. Washington State University. Retrieved fromhttps://whatcom.wsu.edu/ag/homehort/pest/carpenter.htm

Reference no: EM131186958

Questions Cloud

Analyze your story in relation to at least three of key term : Write a 4-6 page paper in which you analyze your story in relation to at least three of the key terms or theoretical approaches we've covered in class so far.
Identify the fixed and variable cost elements : The Mays Clinic has the following monthly telephone records and costs.- Identify the fixed and variable cost elements using the high-low method.
About differences in other countries and cultures : Most of us have heard or read about differences in other countries and cultures. Many of our classmates may be from other countries and cultures. Discuss some of these differences and how they affect business.
What ways stakeholders assess organizational effectiveness : Stakeholders, by the nature of their role, conduct ongoing assessments of the effectiveness of organizations. What are some of the ways stakeholders assess organizational effectiveness? Which of these is most valid? Why? Is there ever a time when ..
How does the fly defeat the nests formidable defenses : How does the fly defeat the nest's formidable defenses and avoid detection? It manufactures chemicals to smell like an ant. You might have the impression that network-based intrusion detection tools.
How would you assess the business risk : How would you assess the business risk of HIH Insurance Limited?- What conditions need to exist for a negligence action to be upheld?.
Legal issues in information security and incident response : Using the online library, the Internet, and all course materials, research cyber criminals, their motives, and the forensic tools used to track an offender.
It auditing and security risk management unit : Peak View Sound Sources is a public company based in Denver, Colorado and is focused on providing digital media and Web sites to music companies and musicians through the Mountain and West Coast regions. The company has a solid reputation and is s..
Scanning for open wireless networks : Law and ethics are often both considerations when determining the reaction to a computer security incident. For instance, scanning for open wireless networks is not illegal unless the scanner connects to the network without permission. Discuss thi..

Reviews

Write a Review

Other Subject Questions & Answers

  Describe each theory according to its theories

List the three theories and theorists are labeled as "human ecology" or the Chicago school. Describe each theory according to its theories, and MAP the layout of this theory

  Process analysis and narration techniques

In approximately 400-500 words, using definition and classification strategies, discuss types of music and their effect on mood.

  Create a robust casual loop diagram

Create a robust casual loop diagram that incorporates appropriate causal loop logic in the analysis, and which also identifies common system archetype patterns within the diagram

  Dreams

Which statement is true about dreams?

  Develop and maintain a therapeutic alliance

Think about how you might develop and maintain a therapeutic alliance with this client without imposing your own values. Both silence and self-disclosure can be used as therapeutic techniques when dealing with these types of challenging situations

  What do you believe to be the appropriate resolution

Look at Article IV, paragraph 1 of the Constitution, the Full Faith and Credit clause. The hot topic in many areas is how this clause will come into play as states disagree on various important social issues such as the sanction of gay marriages.

  Select a specific government tool to support large scale

select a specific government tool to support large scale renewable development and discuss its advantage over other

  Discuss why the current health care system is in turmoil

Discuss why the current health care system is in turmoil. Describe two major problems in health care and analyze the impact of the chosen problems on patients and the community. Assess the risks and/or benefits of a national health insurance system.

  Groups of offenders

Briefly describe each of the four groups of offenders: mentally disordered offenders, sex offenders, violent offenders, and family violence offenders.

  Functionalism-conflict theory-symbolic interactionism

"The United States is a land of opportunity where any individual with talent and hard work can achieve upward mobility." Include also, the theoretical perspective (functionalism, conflict theory, symbolic interactionism or utilitarianism) you feel..

  What was the personality of ann putnam

In the Book the Crucible by Arthur MIller: What was the personality of Ann Putnam, Tituba, Elizabeth Proctor, Reverend Hale, Mercy Lewis and Marshall Herrick

  Is it significant or unimportant for helping clients

They ignore clients' personal history and unconscious, treating them more like pigeons than people". What makes this significant or unimportant for helping clients?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd