What is the gain of using rule sets

Assignment Help Computer Engineering
Reference no: EM133458

Question

When running Snort IDS why may there be no Alerts?

If we only went to a few web sites, why are there so several alerts?

What are benefits of logging more information in the alerts file

what the drawback of logging more information in the alerts file

what is the gain of using rule sets for Snort web site?

Explain in plain English at least one type of ruleset you would want to add a high level security network and why with reason?

If a person with malicious intent were to get to your network and have read or write access to your IDS log how might they use that information to their advantage
An intrusion prevention system be able to either wait until it has all of the information it needs, or be able to allow packets throughout based on statistics (guess or previously known facts) what are advantages and disadvantages of each approach?

So, bad guy decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen; the system can permit all traffic through (without being check) or be able to deny all traffic until the system comes back up. What are the factors that you must consider in making this design choice?

What did you find particularly useful about this lab (please be specific)? What if anything was complex to follow? What would you change to create it better?

Reference no: EM133458

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Write down a little man computer program

Write down a Little Man Computer program.

  How to store ten floating-point values into vector

How to store ten floating-point values into vector. Write down a program that declares a vector of ten floating-point values

  Utilize server manager to install dns role

Utilize Server Manager to install DNS role

  Declare amdahls law

Declare Amdahl's law

  What security measures required to address vulnerabilities

What security measures required to address vulnerabilities Illustrate threats and vulnerabilities that are possible after implementing "big data" technologies in online auctioning company.

  Create an xml document containing information

Create an XML document containing information.

  Design a class diagram for the ticket-processing system

Design a class diagram for the ticket-processing system

  Generate a database for the gps law firm

Generate a database for the GPS Law firm

  Write a java program that creates an array of integers

Write a java program that creates an array of integers

  How to generate paper for pair of public or private rsa key

How to generate paper for a pair of public or private RSA keys? The high-class reporter for foreign affairs learned about asymmetric cryptography, and proposed to security team at the paper to generate for a pair of public or private RSA keys.

  How many address lines are needed to access memory

How many address lines are needed to access memory.

  What profit do you see with partitioned view

Explain your idea for a database along with your thoughts for a partitioned view. 1. How will you use this partitioned view?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd