Capturing network traffic-analyzing network traffic

Assignment Help Basic Computer Science
Reference no: EM132567081

Topic 6.1: Capturing Network Traffic

There are two ways of capturing network traffic: In-line mode and promiscuous mode. In your own words, clearly distinguish the two.

Topic 6.2: Analyzing Network Traffic

After receiving network traffic, your IPS sensors must analyze that traffic. IDP sensors fall into the following categories: Atomic operations, stateful operations, protocol decode operations, anomaly operations, and normalizing operations. In your own words, clearly distinguish any two of these.

Topic 7.1: Alerting Actions and Logging Actions

After they identify potentially malicious activity, your IPS sensors perform specific configure actions: Alerting actions, logging actions, blocking actions, and dropping actions. In your own words, clearly distinguish alerting actions from logging actions.

Topic 7.2: Blocking Actions and Dropping Actions

After they identify potentially malicious activity, your IPS sensors perform specific configure actions: Alerting actions, logging actions, blocking actions, and dropping actions. In your own words, clearly distinguish blocking actions from dropping actions.

Topic 8.1: Weak Points in the Structure of the Internet

Attackers are constantly looking for new ways to exploit the Internet infrastructure. Describe some of the techniques that attackers use to exploit the Internet.

Topic 8.2: Attack Techniques against Websites and Web Users

To exploit the weaknesses with the Internet attackers targeting Web servers. Describe some of the well-known attacks on Web browsers and email applications.

Topic 9.1: Worst Case Scenarios

Worst case scenarios are descriptions of the worst consequences that can befall an organization if a threat occurs. In your own words, how would you quantify the impact of a loss or interruption to a business?

Topic 9.2: Security Reviews

An effective security policy describes immediate steps to take when an intrusion is detected. Describe some conditions that would prompt a security review.

Topic 10.1: Best Practices

What is meant by "Best Practices for Security Policy?" Are you aware of any of these at your work or home network?

Topic 10.2: Risk Analyses Factors

There six risk analysis factors: Assets, threats, probabilities, vulnerabilities, consequences and security controls. Select one of these and describe how it relates to your work or home network?

Reference no: EM132567081

Questions Cloud

What is the correct adjusted ending cash balance : Annapolis Company's bank statement indicated an ending cash balance of $8,440. What is the correct adjusted ending cash balance
Calculate how much is net income : Alpha Company provided the following data concerning its income statement: sales, $985,000; Calculate how much is net income
How much is the gross profit margin : Given below are account balances for Charlie Company: Gross sales, $96,000. How much is the gross profit margin
What should be Agatha Inc pricing objective : The company is facing intense competition from five other companies. In such a situation, what should be Agatha's Inc. pricing objective
Capturing network traffic-analyzing network traffic : There are two ways of capturing network traffic: In-line mode and promiscuous mode. In your own words, clearly distinguish the two.
Show the solution on how the Bonus is computed : Show the solution on how the Bonus is computed. Bonus is a certain percent of income before bonus and before tax. 262,500
Facilitating effective collaboration in IT : Discuss at least three 3 steps for facilitating effective collaboration in IT.
Calculate effective interest rate of a simple discount note : Sam Peters needs to calculate the effective interest rate of a simple discount note for $3100, at an ordinary bank discount rate of 8%, for 70 days
Do you think access controls differ among private industries : Do you think access controls differ among private industries, such as retail, banking, and manufacturing? Why or why not?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd