What is compensation of using rule sets

Assignment Help Computer Engineering
Reference no: EM132996

Question

1. When running Snort IDS why valour there is no alerts?

2. If we only went to a few web sites, why are there so many alerts?

3. What is compensation of logging more information to the alerts file?

4. What is disadvantage of logging more information to the alerts file?

5. What is compensation of using rule sets from the snort web site?

6. Describe at least one type of rule set you would want to add to a high level security network and give reasons?

7. If a person with malicious intent were to get into your network and have read or write access to your IDS log or rule set how could they use that information to their advantage?

8. An intrusion prevention system is able to either wait until it has all of the information it needs, or can allow packets through based on statistics (guessed or previously known facts). What is advantage and disadvantage of each approach?

9. So, the "bad guy" decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen; the system can agree to all traffic through (without being checked) or can deny all traffic until the system comes back up. What are the factors that you should consider in making this design decision?

10. What did you find mainly useful about this lab (please be specific)? What if anything was difficult to follow? What would you vary to make it better?

Reference no: EM132996

Questions Cloud

Discuss the importance of organisational culture : Discuss the importance of organisational culture for effective organisational performance. Support your answer with relevant industry examples
Classify traditional grade school algorithms : Classify traditional grade school algorithms
Analyze running time of algorithm : Analyze running time of algorithm
Explain briefly how electronic money works : Explain briefly how electronic money works. Give two benefits of e-money to each of the following-
What is compensation of using rule sets : What is compensation of using rule sets
What are the roles of the management sponsors : What are the roles of the management sponsors
Illustrate the constraint graph : Illustrate the constraint graph
How to find the number of characters in a string : How to find the number of characters in a string
Explain how you would carry out an effective interview : Elaborate on the steps that are needed to develop effective questionnaires Explain how you would carry out an effective interview

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe stages of the processor

Describe the decode stage and Describe the execution stage of add, andi, mul, divi, and neg.

  What are the roles of the management sponsors

What are the roles of the management sponsors

  Which method allow channel to synchronization sequence

Which method allow channel to synchronization sequence? Discuss the trade-offs between fibre optic and satellite communication in terms of costs, signal capacity, signalling method, interference, likelihood of failure and repair issues, multipoin..

  Examine how computer forensics investigations pertain to law

Examine how computer forensics investigations pertain to law

  How to write code for selection sort, insertion sort

How to write code for selection sort, insertion sort. Using your performance of selection, bubble and insertion sort, add a counter in an appropriate place so as to measure the runtime of your code for example this capacity be a counter to track ..

  Illustrate the constraint graph

Illustrate the constraint graph

  Examine the importance and purpose of of n-tier systems

Examine the importance and purpose of of n-tier systems

  Describe the mechanics of Buffer overflows

Prepare a complete tutorial, including an analogy to describe the mechanics and a graphic to support your analogy, on one of the subsequent areas

  Write down a little man computer program

Write down a Little Man Computer program.

  Classify the use and location of firewalls

Classify the use and location of Firewalls Categorize the use and location of IPS or IDS where necessary.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

  How many address lines are needed to access memory

How many address lines are needed to access memory.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd