INFA 630-Intrusion detection and prevention technology

Assignment Help Basic Computer Science
Reference no: EM132407093

Analytical Research Project Instructions - Intrusion Detection and Intrusion Prevention

Summary

This is a paper describing the results of an analytical research project, worth 25% of your total grade. Your paper should be 10-12 pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Following UMUC policy, all students must upload their papers to Turnitin.com (following instructions provided by your instructor), produce and review an originality report, and submit the final version of the paper to your Assignment Folder prior to the submission deadline.

Paper Topic Selection

Prior to writing your paper, you must submit a short, ungraded, topic proposal. You should submit your intended research paper topic by the end of Session 3. The purpose of this preliminary milestone is to provide your instructor the opportunity to confirm the appropriateness of your proposed topic, sufficiently early in the course to allow for topic revision if necessary. It will be helpful if you include, with your proposed paper topic, the sort of research you intend to do and any specific sources you may have already found or plan to use in researching your topic. Your instructor will provide feedback on the suitability of the proposed topic by the start of Session 5. Students who do not provide a proposed topic will be preparing their research papers "at risk;" i.e., they will run the risk of delivering a paper reflecting research that is not suitable for this course.

Analytical Research Project

The purpose of the Research Project is to develop an in-depth understanding of the intrusion detection and/or prevention technology and the way in which such technology is used to protect specific computing environments against specific threats. To arrive at this understanding, your project may choose to follow either one of two analytical approaches:

1. Analysis of a tool or technique including functional applicability and limitations

2. Analysis of environmental security requirements and technologies to meet those requirements

Tool-centric Research: Projects of the first type will focus on a specific tool, technique, or method used in intrusion detection or intrusion prevention. Choosing a topic for this type of project will mean selecting the tool you want to research and analyze and developing a research question or thesis statement that your research is intended to answer. The analysis for a tool-centric research project should emphasize the use and application of the tool, technique, or method rather than a simple explanation of its features. If you choose a product or tool with a broad set of capabilities, you may choose to provide an analysis of one or more aspects of the tool. The paper distills fundamental issues, focuses on one available solution, and provides a detailed analysis of both the functional applicability and the limitations of the available solution. In other words, you should explain in your paper the functional purposes and/or security goals the chosen tool is well-suited to address, and also things for which it is not a good choice. You are welcome to choose any type of IDS tool, including network-based, host-based, or wireless products.

Environment-centric Research: The second type of project also looks at intrusion detection and prevention technologies, but adopts an organizational perspective by first defining and analyzing an operating environment, and then identifying and recommending appropriate IDS/IPS technologies. Choosing a topic for this type of project will mean describing a specific computing environment and any operational needs for safeguarding that environment. The analysis for an environment-centric research project should emphasize the threats faced by the organization and assess IDS/IPS technologies in the context of providing protection from those threats. This type of research project mimics the process many real-world organizations go through when selecting IDS/IPS tools (or other types of technologies), in which organizations first specify requirements and then evaluate alternatives to see what technologies best meet their requirements. You may choose to focus on a specific organization (like a company or agency) or on a class of organization (e.g., based on relative size, industry, business model, etc.). It is important that you be able to specify security requirements for the organization or operating environment that you choose for your project.

Reference no: EM132407093

Questions Cloud

Best practices for managing social media records : What are the differences between Social Media, E-mail and Instant Messaging? Provide three best practices for managing Social Media Records.
Analysis of each of the steps in DDoS attack scenario : Use the four steps of the NIST computer security process to write a summary and analysis of each of the steps in a DDoS attack scenario.
Describe about your technology : Describe about your technology, why you are using, Advantages, Disadvantages and challenges in this technology etc.
Securing applications is integral part of security plan : Securing applications is an integral part of an overall security plan. Which CIA triad of security does the vulnerability attack?
INFA 630-Intrusion detection and prevention technology : INFA 630-The purpose of the Research Project is to develop an in-depth understanding of the intrusion detection and/or prevention technology
Describe the complex email system : Describe the complex email system that is attached. Describe in detail the benefits of this system using appropriate and applicable examples.
About the benefits of cloud computing applications : Even with this great news about the benefits of cloud computing applications, authors have warned the business user community regarding the dangers associated
Dramatically altered content and records management markets : Microsoft's SharePoint server product dramatically altered the content and records management (RM) markets.
Introduced impact of global digital divide : According to the authors, countries that lag behind the rest of the world's ICT capabilities encounter difficulties at various levels.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd