Prepare a report that address various system irregularities

Assignment Help Computer Network Security
Reference no: EM131666115

Assignment: Analysis of an Intrusion Detection System Report

This assignment builds upon the scenario introduced, from the organization Open Water Diving and Scuba Institute (OWDSI). Specifically, your focus will be on preparing a second supplemental report of approximately 8-10 pages that discusses the organization's intrusion detection system (IDS) and some of the recent reports from this system.

Scenario:

OWDSI's network engineers and system administrators have reported a number of strange network behaviors and system outages. A variety of traffic has been captured in response to this. In addition, network engineers report that the school is seeing very high levels of traffic from a wide variety of hosts and that this traffic is causing outages of the school's public-facing web server and other internal computer systems.

Management has requested that you review the network traffic to determine whether the institution's IDS and intrusion prevention systems (IPSs) can be used to prevent inbound attacks that are being detected. Your manager has requested that you analyze the detected attacks and create a report that describes each attack. Explain the threat it presents and whether the use of an IDS or an IPS is a suitable response.

The following is a compiled list of odd network behaviors reported by network engineers and system administrators of OWDSI:

1. Network traffic analysis shows that a single host is opening hundreds of secure shell (SSH) sessions to a single host every minute.

2. Network traffic shows that hundreds of hosts are constantly sending only synchronized (SYN) packets to a single web server on campus.

3. A system administrator reports that a single host is attempting to log on to a campus SSH server using different user name and password combinations thousands of times per day.

4. A new PDF-based exploit is announced that uses a malformed PDF to exploit Microsoft Windows XP systems.

5. Campus users are receiving e-mails claiming to be from the campus helpdesk. The e-mails ask for users to send their user names and passwords to retain access to their e-mails.

6. A domain name system (DNS) changer malware package has been located on one of the servers.

7. A JavaScript vulnerability is being used to exploit browsers via ad networks on major news sites, resulting in systems being infected with malware.

8. A zero-day vulnerability has been announced on the primary campus backup software's remote administration interface.

9. A virus is being sent via e-mail to campus users.

Tasks:

In a Microsoft Word document, prepare an 8- to 10-page report that addresses the various system irregularities. Your report should consist of the following:

• A cover page
• A table of contents
• An executive summary

o Develop an overview of the organization's key system issues and your recommended remedies

• System irregularities

o Identify and describe each attack listed
o Include an explanation of what each attack is trying to accomplish

• Analysis and recommendations

o Discuss how each of the vulnerabilities could be a potential issue and what the symptoms of each include

o Recommend how to address each of the nine odd network behaviors as described in the assignment scenario above. Justify your responses

o Determine whether an IDS could or should be used to detect each attack and whether each should be blocked using an IPS. Justify your responses

• References

Note: Utilize at least three scholarly or professional sources (beyond your textbook) in your paper. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., in APA format); and display accurate spelling, grammar, and punctuation.

Reference no: EM131666115

Questions Cloud

Compute operating margins for each division : Allocate the indirect headquarters costs of Reidland Manufacturing to each of the four divisions using revenues, direct costs, segment margin.
Discuss supreme court in hobby lobby and citizens united : What rights if any were given to businesses by the Supreme Court in Hobby Lobby and Citizens United
Normally associated with segmentation : Stoneman suggests that channel strategy is not normally associated with segmentation.
Discuss why prevailing market rate for goods : a letter of credit would have to be very specific and as the compensation would depend upon the market rate the decides to make the payment
Prepare a report that address various system irregularities : In a Microsoft Word document, prepare an 8- to 10-page report that addresses the various system irregularities. Identify and describe each attack listed.
Describes the act of a representative : What best describes the act of a representative to take title to an item and the use of a written signed document is used?
What is each division operating margin percentage : Allocate 2017 fixed costs using the allocation bases suggested by Fisher. What is each division's operating margin percentage under the new allocation scheme?
Discuss the keys to success in developing stage : Discuss the keys to success in developing Stage l and Stage ll organizations. Provide an example of a successful company in each stage.
Greatest potential for the logistics pipeline : What does not require direct line of sight between tag and readers? Its use has the greatest potential for the logistics pipeline

Reviews

Write a Review

Computer Network Security Questions & Answers

  Users in your organization are concerned about performance

users in your organization are concerned about performance and network security. after a meeting with your

  How the information will be used for system requirements

How the information will be USED for system requirements - what are the key features of the organizational context of the project - why the project will be successful

  How does data leakage occur in an organization

The focus of the research paper is Data Leakage. How does data leakage occur in an organization? What are the common causes of this problem? How would use address this troublesome trend?

  Reviews of the article- what is the big deal about security

Reviews of the given Article- "What's the Big Deal about Security".

  Interorganizational cybersecurity relationships

Interorganizational Cybersecurity Relationships

  Questions on security in computing and program security

Frequently asked questions on security in computing, program security , operating system , database security ? what is intrusion detection system , what is firewall , what re the non malicious programming errors , theft to security , how to contro..

  Infa 640 cryptology and data protection

Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob’s public key.  Bob downloads a key from the key server which Eve claims is Alice’s public key.

  Configurations of the network devices

use Packet Tracer 6.0.1 posted on the course web site. If you use other versions of Packet Tracer and we cannot run your file, you will get zero mark for the file. No resubmission is allowed.

  The author of your text suggests that the ability to

the author of your text suggests that the ability to connect to the internet via wi-fi is available everywhere bowles

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Present a short summary of the arguments for and against

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  Develop curiosity to generate significant and problematic

Hopefully, this semester your accompanying research helped you to become more critical consumers of the material you read, and to develop the curiosity to generate significant and problematic questions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd