Homework You are expected to make a meaningful contribution for each question of
ID: 3675278 • Letter: H
Question
Homework
You are expected to make a meaningful contribution for each question of this homework. I expect you to formulate your answers with your own words and with enough details that will allow anybody who hasn't read the book to understand the most important concept.
Response for each question should be at least two or three paragraphs. All answers should be substantive, consistently responsive to the Topic Questions and demonstrate significant understanding of the subject (e.g., illustrate a point with examples, suggest alternative perspectives on an issue and seeks to draw a new or original conclusion). Uses citations in a way that reflects a complete understanding of the topic.
Answer the four questions below:
1.) Explain with your own words what is a Perimeter Defense? Then, provide specific details of the hardware and software that you will use to achieve a perimeter defense.
2.) Explain with your own words what is a zero configuration networks? And the type of attacks that can be launched to exploit zero configuration networks vulnerabilities.
3.) Define with your own words "insider threats" and explain with details how you will protect an organization against the insider threats.
4.) What is an intrusion detection systems? Explain the difference between intrusion detection and intrusion prevention. Lastly talk about the emerging technologies in intrusion detection system.
Explanation / Answer
1)
>IDS:
An Intrusion Detection System (IDS) is a network security technology originally built for detecting vulnerability exploits against a target application or computer. Intrusion Prevention Systems (IPS) extended IDS solutions by adding the ability to block threats in addition to detecting them and has become the dominant deployment option for IDS/IPS technologies.
>Difference between IDS and IPS:
Intrusion Detection System - A device or application that analyzes whole packets, both header and payload, looking for known events. When a known event is detected a log message is generated detailing the event.
Intrusion Prevention System - A device or application that analyzes whole packets, both header and payload, looking for known events. When a known event is detected the packet is rejected.
Note:
>The functional difference between an IDS and an IPS is a fairly subtle one and is often nothing more than a configuration setting change.
2)
>A zero-configuration network is an IP network that is configured without using any manual configuration or configuration servers. This setup allows someone without networking expertise to connect computers, printers and other network devices and receive automatic network functionality. Automatic functions include allocating IP addresses, translating between domain names and IP addresses, and locating services such as printing without employing a directory service.
>A zero-configuration network is also known as a zeroconf network or sometimes just zeroconf.
Types of Network attacks:
Spoofing attacks
Hijacking attacks
chas attacks
denail of service attacks
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.