What are advantage of logging more information to alert file

Assignment Help Computer Network Security
Reference no: EM131320849

Lab Questions

1. When running Snort IDS why might there be no alerts?

2. If we only went to a few web sites, why are there so many alerts?

3. What are the advantages of logging more information to the alerts file?

4. What are the disadvantages of logging more information to the alerts file?

5. What are the advantages of using rule sets from the snort web site?

6. Describe (in plain English) at least one type of ruleset you would want to add to a high level security network and why?

7. If a person with malicious intent were to get into your network and have read/write access to your IDS log or rule set how could they use that information to their advantage?

8. An intrusion prevention system can either wait until it has all of the information it needs, or can allow packets through based on statistics (guessed or previously known facts). What are the advantages and disadvantages of each approach?

9. So, the "bad guy" decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen, the system can allow all traffic through (without being checked) or can deny all traffic until the system comes back up. What are the factors that you must consider in making this design decision?

10. What did you find particularly useful about this lab (please be specific)? What if anything was difficult to follow? What would you change to make it better?

Reference no: EM131320849

Questions Cloud

How it compares to what was being done before : Consider what you have learned in class this semester. Take one of those concepts and apply it to your every day life. This could include something you do at work or in service to the community. Write a 5 page paper that follows the basic outline ..
New-product strategy development stage : Describe in your own words the new-product strategy development stage in the new-product process? What are the main sources of new-product ideas?
Global market entry strategy would be best : 1. If Starbucks wants to enter the Cuban market which global market entry strategy would be best? Why would you choose that particular strategy?
Is it also valid for computing the hole concentration : When the Boltzmann approximation is valid for computing the electron concentration, is it also valid for computing the hole concentration? Give two examples, one showing the true and the other, the false answer.
What are advantage of logging more information to alert file : What are the advantages of logging more information to the alerts file? What are the disadvantages of logging more information to the alerts file? What are the advantages of using rule sets from the snort web site?
Information on various job openings : Go to various different websites to find information on various job openings within the field of sales. At least three of these need to be business to business type sales jobs.
Are you predicting that you will obtain an interaction : What main effects and interaction could you test with the design you developed for Question 3? Are you predicting that you will obtain an interaction?
Compare holism systems thinking versus reductionism : This research paper will compare and contrast Holism (Systems Thinking) versus Reductionism. The research paper must be submitted using Safe Assign.
Outline an anti-fraud program : Outline an anti-fraud program that you would implement at your company (current or previous). Suggest the approach you would take to sell this program to your senior executives. Provide a rationale for your response.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Research commercial data repositories be sure to understand

in this writing assignment you will create a brochure advertising your services as a data repository.research

  Content of e-mail rightfully belongs to sender-receiver

Who does content of e-mail rightfully belongs to sender or receiver? Are security threats overblown? Present the example to support response.

  Security solutions model module in skillport

Complete the Security Solutions Model module in Skillport.  Attach a copy (screen shot) of the final test page to your assignment below. Scenario: Your boss wants to know how to detect an intrusion into or an attack on the ecommerce network. Your b..

  Write down a 1000- to 1500-word paper explaining the

write a 1000- to 1500-word paper describing the importance of policies and standards for maintaining information

  Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash."

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

  Create an overview of the hipaa security rule

Analyze how a hospital is similar to and different from other organizations in regards to HIPAA compliance. List the IT audit steps that need to be included in the organization's overall IT audit plan to ensure compliance with HIPAA rules and regul..

  Mobile devices security

Mobile Devices Security

  Which displacement produces largest number of coincidences

Use displacements of 5 and 6. Which displacement produces the largest number of coincidences? Find the key. Find the plaintext.

  Describe the different types of computer attacks

Describe the different types of computer attacks. Evaluate the ethical concerns that computer crimes raise in society and the impact of information technologies on crime, terrorism, or war.

  The proposed cyber security act

Review the May 2011 Cyber Security Legislative Proposal, the proposed Cyber Security Act of 2012, Executive Order (EO) 13636 Improving Critical Infrastructure Cyber security, and Presidential Policy Directive (PPD) 21 Critical Infrastructure Secur..

  Research and report upon the problem of supply chain risk

For this paper, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd