Explain some of the difficulties associated with configuring

Assignment Help Computer Engineering
Reference no: EM133572932

Discussion Post: IDS in Network Security

Intrusion detection systems have fundamental flaws in their designs and functionalities. Intrusion detection does not necessarily prevent intrusions. As more organizations encrypt traffic, it becomes increasingly difficult to track intrusions because IDSs have no capabilities to examine encrypted traffic and are, therefore, unable to recognize problems and create alerts. Engineers rely heavily on IDSs to fight hackers. If configured improperly, the IDS will generate false positive alerts, which can be disastrous to the organization. Too many alerts can cause security administrators to become complacent and overlook important events. Several studies have shown that detections of negative security events can take over six months.

In this discussion, you are going to look at the role of IDSs in protecting digital assets. Research a minimum of three industry publications (e.g., National Institute for Standards & Technology [NIST], Institute of Electrical and Electronic Engineers [IEEE], Internet Engineering Taskforce [IETF], etc.) on this topic. Address the differences and similarities between IDS and intrusion protection systems (IPS). Explain some of the difficulties associated with configuring and maintaining IDSs, given the changing pattern of traffic on networks. Considering these issues, explain why organizations rely heavily on IDSs, even though they do not prevent hackers from penetrating an infrastructure. Support your statements with evidence from your sources.

Reference no: EM133572932

Questions Cloud

What you define as a dignified life : What you define as a Dignified Life? How the Holocaust challenges your previous belief of it?
What types of ethical challenges are common : What are your most strongly held values? Based on your research, what types of ethical challenges are common in your profession? Which of your ethical beliefs
Ancient cosmologies of various cultures : Our Western cosmological views were built off of Plato's descriptions of the celestial world. This is a Post Library article
Reflect on the online leaning methodology : Reflect on learnings from the unit this semester and list at least three things you learnt by participating in this unit Reflect on the online leaning
Explain some of the difficulties associated with configuring : Explain some of the difficulties associated with configuring and maintaining IDSs, given the changing pattern of traffic on networks.
How does an understanding of ancient people help protect : How does an understanding of ancient people help protect modern humans?
Why do you suppose the court does not appear to think so : should it have affected whether Costello could prevail on his claims? Why do you suppose the court does not appear to think so?
Write one scene for a new fictional film : write one scene for a new fictional film about Zora Neale Hurston's life. The scene will focus on the last dialogue between Zora Neale Hurston and Langston Hugh
How has technology helped facilitate spiritual development : BMIS 520- How has technology helped facilitate your spiritual development? Provide at least 2 specific examples that you have found helpful.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make a simple scientific calculator

make a simple scientific calculator that will allow the following functions to be calculated.

  Estimate the surface temperature of the cable

Thermal energy generated by the electrical resistance of a 5-mm-diameter and 4-m-long bare cable is dissipated to the surrounding air at 20°C.

  Discuss at least one of the ways to test a threat mitigation

ISOL 536 Security Architecture and Design Threat Modeling. Discuss at least one of the ways to test a threat mitigation (one page only with references and APA)

  Symptoms of group think would they most likely display

which of the following symptoms of Groupthink would they most likely display?

  Write an application that allows a user to input the height

Write an application that allows a user to input the height and width of a rectangle and output the area and perimeter.

  Compute the negations for each of the statements

Compute the negations for each of the statements, via transforming the negation connectives inward, such that the negation symbols immediately

  How would classroom planning and instruction need to change

EDUC 730 Liberty University - How would classroom planning and instruction need to change in order to fully capitalize on the strengths of problem-based

  Conduct a simple energy audit of college computer labs

ICTSUS601 Integrate Sustainability in ICT Planning & Design Projects. ICTNWK609 Configure & Manage Intrusion Prevention System on Network Sensors, ALTEC College

  Program is subject to speedup by using two cores

Total Speedup for a quad-core processor on the first half of the program is subject to speedup by using two cores and the second half uses all four cores

  What database tables and fields do you think are needed

Go to half website and look up a popular movie that they sell as a DVD. What database tables and fields do you think are needed to represent the data for a DVD?

  Write one java program to read numbers

Write one java program to read numbers from one file and add +1 to each number readed from the file,and past result in another file

  Why requirements specification document be kept up to date

Why should the requirements specification document be kept up to date? Why does the internal customer or internal customers set requirement priorities?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd