Explain the difference between IDS - firewall and antivirus

Assignment Help Computer Network Security
Reference no: EM132294657

Activity 1

You work as a network Security administrator in ABC Company, you have notice your organization network and system is experiencing different kind of intrusion. Select appropriate IDS for the following case:

1. Employees in media and communication department are always accessing to different social media application/website from their PCs. Hence, these PCs are always attacked by different maiware. You want to detect these attacks.

2. One specific portable PC is always misused by users in your organization.

3. Your organization has multiple branches in Nizwa , Sohar and Salalah . Your branches are always facing a well-known spoofing attack.

4. Your organization is facing a distributed denial of service attacks which effect internal and external services availability.

5. You have contacted one international vendor to provide you the newest IDS in the market. The vendor suggested to have Symantec IDS software which requires high processing capacity, however your organization doesn't have one machine that can satisfy all the processing requirements. This IDS can be used with clustering techniques .

6. Your organization database has been attacked, your current IDS could not detect this attack because this is a new attack which has never occurred before.

Activity 2:

1. Network can be secure by deployment of different security controls including three that appear to be the most frequently used: IDS, firewall and antivirus.

A. Explain the difference between: IDS, firewall and antivirus.

B. Deploying only one of these controls is not enough to protect your Network. Accordingly analyze the following cases.

I. A portable storage device has been used and infected outside the corporate network, and then attached and used in your LAN. Justify why firewall will fail to protect your network from being infected? Suggest a security control for this scenario.

II. Unauthorized user is trying to Access your LAN through the Internet. Justify why IDS will fail to protect you from this unauthorized access? Suggest a security control for this scenario.

III. You want to establish a secure extranet and intranet connectivity with partners, Justify why firewall might not be enough to provide appropriate security? Suggest another security control can be added to provide better security.

IV. A newly released malware has attacked your LAN through an end user device. Justify why antivirus could not protect you from this malware? Suggest a security control that can detect this malware.

Attachment:- Network configuration.rar

Reference no: EM132294657

Questions Cloud

List and explain in detail the two different hci : Can you pls give me a guide or direction on how to answer these questions? 1. List and explain in detail the two different HCI methods of usability inspections
Detail explanation of this incremental mining : Please provide a detail explanation of this incremental mining:
Please explain the characteristics of constraint : Please explain the characteristics of each constraint such as monotone, anti-monotone, succinct, convertible etc.
Show a function in this file called nine : Show a function in this file called nine_lines that uses the function three_lines (provided below) to print a total of nine lines.
Explain the difference between IDS - firewall and antivirus : Explain the difference between: IDS, firewall and antivirus - Deploying only one of these controls is not enough to protect your Network
Badhour and badseconds : You will have two exceptions to throw: BadHour and BadSeconds. Throw the exceptions instead of using bool methods for setting values
Define exploration and settlement of the american west : Write a 350- to 700-word personal journal of your experience and what you are discovering. (Write this in first person.) Include explanations to the following.
Explain why the opposing view is weak in comparison to yours : Consider if a person selected the thesis statement you did not choose. Explain why the opposing view is weak in comparison to yours.
What were the greatest gains and challenges : "Historian, Henry Louis Gates, Jr. takes a personal journey through the last 50 years of African American history, charting the incredible progress made.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd