Evaluate the limitations of network-based defensive tools

Assignment Help Computer Engineering
Reference no: EM132137997

Discussion : A Network-Based Intrusion

Imagine you live by yourself on a quiet street. Each day, you leave your house in the morning and drive to work. One day while you are at work, someone breaks into your house by kicking in your front door. When you come home later, you can immediately see that someone has forcibly entered your house.

But what if the burglar had been more subtle and had picked the lock instead, re-locking the door before leaving? At first, you might not know you had been robbed.

But once you did, you might feel really uncomfortable with the idea that someone could enter your home without breaking a window or kicking in a door. For peace of mind, you probably would have an alarm system installed.

A network-based intrusion detection system (NIDS) is like a home's alarm system. Ideally, when someone breaks into a network that has an NIDS, an alarm is triggered. Like other important defensive tools, an NIDS is not infallible; a determined hacker always can find ways to defeat it and avoid detection.

To prepare, read the Discussion notes in the Unit 3 Notes, located in this unit's Learning Resources, and consider the following scenario:

Despite having a firewall and an NIDS, a company's systems have been hacked. Unfortunately, its network-based defensive tools did not detect the intrusion.

Evaluate the limitations of three network-based defensive tools. Based upon your evaluation, provide plausible explanations of how the hackers avoided detection.

In your posting, address the firewall and NIDS.

Reference no: EM132137997

Questions Cloud

Why is the term asymmetric information : Why is the term asymmetric information in order to understand why some people are better informed than others, and the imbalance in information affects
Describes the organization you are targeting : You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research.
Determine the equilibrium price and quantitiy : a) Determine the equilibrium price and quantitiy. b) Suppose a $12 excise tax is imposed on the good. Dete rmine the new equilibrium price and quantity.
What is percent of lumber from each of the three supplies : What is the percent of clear lumber from each of the three suppliers? What is the percent of lumber from each of the three supplier.
Evaluate the limitations of network-based defensive tools : Evaluate the limitations of three network-based defensive tools. Based upon your evaluation, provide plausible explanations of how the hackers avoided detection
What are the main things to remember about elasticity : What are the main things to remember about elasticity, supply and demand, tax incidence, government controls on the market, and economic theories?
Write a function obenglobish that takes an english word : Write a function obenglobish that takes an English word and returns its Obenglobish equivalent, using the translation rule given above.
How many bytes does this string take in the memory : If a string is stored at the memory address 0 times 20008000 and the string is "Cortex-M", show the memory content in hex format starting at 0 times 20008000.
Define constructors and destructors : Define constructors and destructors, define member functions outside of the class body, develop a copy constructor and assignment operator.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the result of a poor design of a runner system

What is the result of a poor design of a runner system? What is the difference between a sprue and other cooling channels?

  How your team has decided to address the issues

Discuss issues encountered in the work and how your team has decided to address the issues. Prepare a functional prototype of your application.

  Design an fir filter

An alternative method for designing an FIR filter that approximates the desired channel characteristics is based on the window method.

  Evaluate the coding artifacts in mpeg encoding

Evaluate the coding artifacts (showing up as video noise) in MPEG encoding. Provide the following details: (i) the signal characteristics of video noise (ii) the causes of the video noise, and, (iii) suggest methods to reduce the video noise.

  What is the difference between a job and a process

What is the difference between a job and a process? How do you suspend the foreground job and move a suspended job to the background.

  Developing the java program

Create a block utilizing a loop which will calculate the number of items which can be purchased on the basis of price of the item and total amount available to spend.

  What are the ip fragment offsets and more flags

Given an IP packet of 540 bytes and a maximum packet size of 200 bytes, what are the IP Fragment Offsets and More Flags for the appropriate packet fragments?

  Execute the boolean functions

Execute the Boolean functions

  Define a byte addressable main memory of 2^16 bytes

Given, a byte addressable main memory of 2^16 bytes and block size of 8 bytes, using direct mapped cache consisting of 32 lines.

  Identify and list the functional dependencies

Identify and list the functional dependencies. Create set of 3NF relations using shorthand notation. Be sure to identify primary and foreign keys appropriately.

  Explain a mitigating strategy for the risks

Briefly identify and describe a mitigating strategy for the risks.

  Define a function wordsstats that takes one parameter

Define a function wordsWithLetter() that takes 2 parameters: 1. text, a string containing words and white spaces 2. letter, a string of length 1

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd