Overview on ids and ips or honeypot

Assignment Help Management Information Sys
Reference no: EM13779562

IDS, IPS, or Honeypot currently offered by product vendors and cloud service providers. You will be making a security recommendation, related to the protection of a target network of your choice.

There are a few different paths you may take in this lab, so let's address some of the distinguishing features and definitions that are out there.

IDS and IPS Overview

An intrusion detection system (IDS) generally detects and logs known intrusions or anomalous network activity. Generally, no real-time protection actually occurs, therefore false-positives create little or no damage. Optionally, suspicious network traffic can be routed to an alternate network, such as a honeypot.

An intrusion protection system (IPS) generally detects, logs, and then blocks known intrusions or anomalous network activity. False-positives are an issue and will result in a self-inflicted denial of service condition. Optionally, suspicious network traffic can be routed to an alternate network, such as a honeypot.

Honeypot Overview

Honeypots come in several broad categories. The most common labels we apply to them are research honeypots, active honeypots, and offensive honeypots. They are designed to do what their label suggests, and here is a brief summary.

Note: Seek qualified legal advice before deploying any type of honeypot.

Research honeypots generally collect and analyze data about the attacks against a decoy-network. They can also route the attacker to new decoy-networks, to gather more details about the potential attacks. The data gathered are used to understand the attacks and strengthen the potential target networks.

Active honeypots have many of the features found in a research honeypot, but they also hold special content that, once taken by the attackers, can be used as evidence by investigators and law enforcement. For example, active honeypots may have database servers containing a fake bank account or credit card information.

Offensive honeypots are configured with many of the features of the active honeypots, with one interesting and dangerous addition: they are designed to damage the attacker. When used outside of your own network, this type of honeypot can result in vigilantism, attacks against false-targets, and may result in criminal charges against the honeypot operators. Offensive honeypots are not recommended for non-law-enforcement organizations. However, when used fully within your own network, this technique can detect and neutralize the attacker.

Any of the above services can be implemented on a privately managed network, or through a cloud service. The selection of one platform over another will generally determine where the specific protection occurs-on your network or in the cloud.

The reason for this lab is to give you an understanding of how special network technology can be used as a security research tool, while also providing varying degrees of protection.

Deliverables

Document Authoring Guidelines

Each section will vary in size based on the requirements. Drive yourself to create a useful document for the direction you have selected.

Lab Document Framework

The Target Network: Indicate the type of activities and data that it supports in a few sentences. For example, it is the website for an educational institution that holds personal academic and financial information, or it is the network used to control devices in a chemical plant.

Use your imagination, but select something that is real and meaningful to you.

The Protection System: Select one from the presented list (Step 2), or choose your own protection technology, if it is highly relevant.

Reference no: EM13779562

Questions Cloud

Explain the historical and modern-day ethical issues : What are the historical and modern-day ethical issues in the law enforcement procession? How have these issues affected law enforcement personnel
Write an essay about the effects of the european union : Write an essay about the effects of the European Union. The eassay must be 3 pages " references page not included" and the essay should also mention a few causes and focus on effects and not all effects.
How might change the electronic structure : How might change the electronic structure of the ion - monoclinic crystal symmetry leads to distortion of the Y6 surrounding structure.
Quiz on psychological : Vioxx, Celebrex, and Bextra are painkillers, and all of them are risky for heart patients. It must be the case that all painkillers are risky for heart patients.
Overview on ids and ips or honeypot : IDS, IPS, or Honeypot currently offered by product vendors and cloud service providers. You will be making a security recommendation, related to the protection of a target network of your choice.
Is there any way to come to a win-win situation here : What legal options does Frank Oldburr have to get himself covered with a health plan? Is there any way to come to a win-win situation here? Explain
Write a summary of grade inflation in the college classroom : write a summary of Grade inflation in the college classroom. In the first paragraph, use several quotations to highlight the main points of the article.
Concepts of political culture and political socialization : Construct a comprehensive essay explaining how the concepts of political culture and political socialization could have possibly shaped, influence and impact the decision-making process as it relates to Dr. Ben Carson.
What is the drug enforcement administration : What is the drug enforcement administration (DEA) schedule for methamphetamine, and what category drug is it, legally? When taking a person into custody, what would make methamphetamine users different from users of other controlled substances? Why

Reviews

Write a Review

Management Information Sys Questions & Answers

  Private ownership of storage space

The answer to Business Logistics/Supply Chain Management and Compare and contrast private ownership of storage space to rented storage space

  Provide an example of an organization

Businesses that use technology to change its level of learning and provide an example of an organization

  Monitoring the user domain

Describe how the implementation process for such controls might vary based on the business type. Determine the impact that other factors such as physical security, device type, and connectivity (wireless or wired) might have on the choices that ar..

  What sort of service level agreement do they offer

Disk vs Cloud Storage, Backups, SLAs - What sort of service level agreement (SLA) do they offer? Are you willing to store your information with a personal cloud provider that offers no SLA? Why or why not?

  What are the privacy and security concern

Course name: Legal, Privacy , Security Issus in E-Commerce-What are the privacy and security concern

  1 identify the major typetypes of information systemsystems

1 identify the major typetypes of information systemsystems that existsexist in the organisation you are working in or

  Pros and cons of the current alcan technology

What are the pros and cons of the current Alcan technology infrastructure? What are the pros and cons of the new Alcan technology infrastructure proposed by Robert Ouelette

  Yu will conduct research and analyze information to make

you will conduct research and analyze information to make recommendations for an updated system that can meet the

  Explian how well does your company forecast their sales

How well does your company forecast their sales? Does the forecasting allow sufficient time for Operations to respond? Does operations perform any adjustments to the forecast to ensure on-time delivery or prevent excess inventory?

  Most relevant to the field of logistics

What two concepts do you think are the most relevant to the field of logistics and why and Which one or two concepts do you think are the least relevant to the field of logistics and why?

  What competitors might overtake it

In 10 years, will Facebook still be so popular and so dominant? What competitors might overtake it? What are some substitute products for social networking sites such as Facebook

  Examples of logical and physical integration issues

Pick an organization that you know of or where you are/were working and provide examples of logical and physical integration issues that were faced by the organization when they broke the functional silos and moved to integrated systems.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd