Prepare a report that address various system irregularities

Assignment Help Computer Network Security
Reference no: EM131666115

Assignment: Analysis of an Intrusion Detection System Report

This assignment builds upon the scenario introduced, from the organization Open Water Diving and Scuba Institute (OWDSI). Specifically, your focus will be on preparing a second supplemental report of approximately 8-10 pages that discusses the organization's intrusion detection system (IDS) and some of the recent reports from this system.

Scenario:

OWDSI's network engineers and system administrators have reported a number of strange network behaviors and system outages. A variety of traffic has been captured in response to this. In addition, network engineers report that the school is seeing very high levels of traffic from a wide variety of hosts and that this traffic is causing outages of the school's public-facing web server and other internal computer systems.

Management has requested that you review the network traffic to determine whether the institution's IDS and intrusion prevention systems (IPSs) can be used to prevent inbound attacks that are being detected. Your manager has requested that you analyze the detected attacks and create a report that describes each attack. Explain the threat it presents and whether the use of an IDS or an IPS is a suitable response.

The following is a compiled list of odd network behaviors reported by network engineers and system administrators of OWDSI:

1. Network traffic analysis shows that a single host is opening hundreds of secure shell (SSH) sessions to a single host every minute.

2. Network traffic shows that hundreds of hosts are constantly sending only synchronized (SYN) packets to a single web server on campus.

3. A system administrator reports that a single host is attempting to log on to a campus SSH server using different user name and password combinations thousands of times per day.

4. A new PDF-based exploit is announced that uses a malformed PDF to exploit Microsoft Windows XP systems.

5. Campus users are receiving e-mails claiming to be from the campus helpdesk. The e-mails ask for users to send their user names and passwords to retain access to their e-mails.

6. A domain name system (DNS) changer malware package has been located on one of the servers.

7. A JavaScript vulnerability is being used to exploit browsers via ad networks on major news sites, resulting in systems being infected with malware.

8. A zero-day vulnerability has been announced on the primary campus backup software's remote administration interface.

9. A virus is being sent via e-mail to campus users.

Tasks:

In a Microsoft Word document, prepare an 8- to 10-page report that addresses the various system irregularities. Your report should consist of the following:

• A cover page
• A table of contents
• An executive summary

o Develop an overview of the organization's key system issues and your recommended remedies

• System irregularities

o Identify and describe each attack listed
o Include an explanation of what each attack is trying to accomplish

• Analysis and recommendations

o Discuss how each of the vulnerabilities could be a potential issue and what the symptoms of each include

o Recommend how to address each of the nine odd network behaviors as described in the assignment scenario above. Justify your responses

o Determine whether an IDS could or should be used to detect each attack and whether each should be blocked using an IPS. Justify your responses

• References

Note: Utilize at least three scholarly or professional sources (beyond your textbook) in your paper. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., in APA format); and display accurate spelling, grammar, and punctuation.

Reference no: EM131666115

Questions Cloud

Compute operating margins for each division : Allocate the indirect headquarters costs of Reidland Manufacturing to each of the four divisions using revenues, direct costs, segment margin.
Discuss supreme court in hobby lobby and citizens united : What rights if any were given to businesses by the Supreme Court in Hobby Lobby and Citizens United
Normally associated with segmentation : Stoneman suggests that channel strategy is not normally associated with segmentation.
Discuss why prevailing market rate for goods : a letter of credit would have to be very specific and as the compensation would depend upon the market rate the decides to make the payment
Prepare a report that address various system irregularities : In a Microsoft Word document, prepare an 8- to 10-page report that addresses the various system irregularities. Identify and describe each attack listed.
Describes the act of a representative : What best describes the act of a representative to take title to an item and the use of a written signed document is used?
What is each division operating margin percentage : Allocate 2017 fixed costs using the allocation bases suggested by Fisher. What is each division's operating margin percentage under the new allocation scheme?
Discuss the keys to success in developing stage : Discuss the keys to success in developing Stage l and Stage ll organizations. Provide an example of a successful company in each stage.
Greatest potential for the logistics pipeline : What does not require direct line of sight between tag and readers? Its use has the greatest potential for the logistics pipeline

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd