What are advantage of logging more information to alert file

Assignment Help Computer Network Security
Reference no: EM131320849

Lab Questions

1. When running Snort IDS why might there be no alerts?

2. If we only went to a few web sites, why are there so many alerts?

3. What are the advantages of logging more information to the alerts file?

4. What are the disadvantages of logging more information to the alerts file?

5. What are the advantages of using rule sets from the snort web site?

6. Describe (in plain English) at least one type of ruleset you would want to add to a high level security network and why?

7. If a person with malicious intent were to get into your network and have read/write access to your IDS log or rule set how could they use that information to their advantage?

8. An intrusion prevention system can either wait until it has all of the information it needs, or can allow packets through based on statistics (guessed or previously known facts). What are the advantages and disadvantages of each approach?

9. So, the "bad guy" decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen, the system can allow all traffic through (without being checked) or can deny all traffic until the system comes back up. What are the factors that you must consider in making this design decision?

10. What did you find particularly useful about this lab (please be specific)? What if anything was difficult to follow? What would you change to make it better?

Reference no: EM131320849

Questions Cloud

How it compares to what was being done before : Consider what you have learned in class this semester. Take one of those concepts and apply it to your every day life. This could include something you do at work or in service to the community. Write a 5 page paper that follows the basic outline ..
New-product strategy development stage : Describe in your own words the new-product strategy development stage in the new-product process? What are the main sources of new-product ideas?
Global market entry strategy would be best : 1. If Starbucks wants to enter the Cuban market which global market entry strategy would be best? Why would you choose that particular strategy?
Is it also valid for computing the hole concentration : When the Boltzmann approximation is valid for computing the electron concentration, is it also valid for computing the hole concentration? Give two examples, one showing the true and the other, the false answer.
What are advantage of logging more information to alert file : What are the advantages of logging more information to the alerts file? What are the disadvantages of logging more information to the alerts file? What are the advantages of using rule sets from the snort web site?
Information on various job openings : Go to various different websites to find information on various job openings within the field of sales. At least three of these need to be business to business type sales jobs.
Are you predicting that you will obtain an interaction : What main effects and interaction could you test with the design you developed for Question 3? Are you predicting that you will obtain an interaction?
Compare holism systems thinking versus reductionism : This research paper will compare and contrast Holism (Systems Thinking) versus Reductionism. The research paper must be submitted using Safe Assign.
Outline an anti-fraud program : Outline an anti-fraud program that you would implement at your company (current or previous). Suggest the approach you would take to sell this program to your senior executives. Provide a rationale for your response.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

  Write a program in to find the largest value of k

Write a program in to find the largest value of k such that there exists a k-core in a given undirected graph G = (V, E). Also print out the nodes in the largest k-core.

  Application of principles of ethics to ict-related issues

Demonstrate factual knowledge, understanding and the application of principles of ethics to ICT-related issues and demonstrate depth of analysis by examining arguments for one ethical issue related to ICT

  Explain the site for marketing and site design purposes

Using the library, the Internet, and any other materials, prepare a PowerPoint presentation that outlines the following items

  Explain importance of explicit enterprise security policies

Identify the predominant electronic and physical threats to communications networks. Explain the importance of explicit enterprise security policies and procedures. Describe potential threat detection and protection techniques. Explain the importance..

  In what way is an unprotected idle pc a danger to internet

In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by another party to implement a denial of service attack.

  How to use tools to evaluate best security mechanisms

How to use tools to evaluate best security mechanisms for dealing with internal and external threats Consolidate all sections of the paper

  Case study on research genetics

ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept top secret at any cost.

  What actions did the botnet owners perform

What is the number of the line in search.php that contains the vulnerability - what type of vulnerability does this line contain - What actions did the botnet owners perform to regain control of the botnet from the researchers?

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Compare u.s. and e.u. policies

Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy. In your estimation, could self-regulation be effective or does it need to..

  Recognize the various ways that agency or organization

cyber security power point presentation using the information you learned from modules 1 and 2 create a powerpoint

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd