Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

You have been tasked to analyze and assess the security posture of your organiza

ID: 3708146 • Letter: Y

Question

You have been tasked to analyze and assess the security posture of your organization’s network resources and servers. Throughout this course, the assignments will have you review and analyze the policies and processes procedures that are implemented to ensure the security of one of an organization’s most important assets: network resources. You will learn how to systematically approach a vulnerability assessment and along the way anticipate the methods that hackers take to break into a system with the goal of finding the same vulnerabilities they would and correcting them to reduce the likelihood of an exploit.

To begin, you are tasked to describe what mechanisms and tools can be implemented to detect and prevent an intrusion into the network. Describe what an Intrusion Detection System and an Intrusion Prevention system are, how they are similar and how they are different. In addition, what other mechanisms can be used in a network and server environment to detect when an intrusion has taken place.

Explanation / Answer

Threats, vulnerabilities and intrusions

Information is digital represented by zeroes and ones, they can be threatened by unauthorized accessibility. So proportional methods like environmental, personal, and administrative security must be get involved in this issue. The most obvious threat to an information resource is missing data, which almost caused by malicious behaviors internally or externally.Any authorized user who performs unauthorized actions that result in loss of control of computational assets, or actions resulting in unauthorized disclosure of information, is malicious insider one. In addition, these actions negatively impact the confidentiality, authenticity, and availability of information systems and information assets. The term vulnerability, describes a problem, i.e., a programming bug or common configuration error that allows a system or network to be attacked or broken into, mostly caused by complexity of networks. More precisely, vulnerability is a security hole, i.e., hardware, software or network weakness which allows an attacker to reduce an information assurance. Indeed, finding vulnerabilities is a main part of the hacker to attack. Security holes can be seen as open doors where they are thought to be closed. Poor passwords, bugs of software, a computer virus or a script code injection and weak links may result in vulnerabilities. According to the report, the

number of vulnerabilities discovered in September 2011 is still on the rise with an increase of more than 70% over the past two years. Intruder and virus are named as two more popular threats in security and commonly addressed to as a hacker or cracker. Intruders can be classified in three classes:

? Intrusion detection and prevention system Experimental Consideration

Attempts to breach information security are raising every day, along with the availability of the vulnerability assessment tools that are openly available on the Internet freely, as well as for commercial use.An intrusion occurs while an attacker attempts to get into an information system or cause disruption; in fact, its behavior intends to do harm. Intrusion detection and prevention systems help information system prepare for, and deal with attacks. They accomplish this by collection information from a diversity of systems, monitoring and then analyzing for possible security problems. Indeed, an intrusion detection system (IDS) after detection of a violation raises an audible or visual alarm, or it can be silent like an e-mail message or pager alert. Another extension of this technology is the intrusion prevention system (IPS), which can detect an intrusion and in addition prevent that intrusion to be successful by an active response. Whereas the two systems often coexist, the combined term intrusion detection and prevention system (IDPS) is commonly used to describe current anti-intrusion technologies.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote