What are advantages and disadvantages of using such a tool

Assignment Help Computer Network Security
Reference no: EM131826753

Problem

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Consider the amount of work in both the configuration of the program and on the system administrator monitoring the responses generated.

Reference no: EM131826753

Questions Cloud

What types of information could be used : What types of information could be used? What does this use suggest to you about the content and detail of such information?
The egyptian revolution : A popular uprising that started on January 25, 2011 in Egypt led to the 2011 Egyptian Revolution. Polls show that about 69%
Discuss the considerations that should come into play : Discuss the considerations that should come into play when deciding on locations for wireless NIDS sensors.
Assisted reproductive technology : Assisted Reproductive Technology (ART) is a collection of techniques that help facilitate pregnancy (e.g. in vitro fertilization).
What are advantages and disadvantages of using such a tool : What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely.
What are the key customer needs that Nordstrom aims to fill : How would you characterize the competitive strategy of a high-end department store chain such as Nordstrom? What are the key customer needs that Nordstrom aims?
What are the hypotheses for testing if yawning : What are the hypotheses for testing if yawning is contagious, i.e. whether it is more likely for someone to yawn if they see someone else yawning?
What are some weaknesses of a packet filtering firewall : What information is used by a typical packet filtering firewall? What are some weaknesses of a packet filtering firewall?
What is an application-level gateway : What is the difference between a packet filtering firewall and a stateful inspection firewall? What is an application-level gateway?

Reviews

Write a Review

Computer Network Security Questions & Answers

  The network administrator to protect the network against

over the past several years the chief executive officer of your company has read articles on internet control message

  Create another working signature and message

Using the RSA public key (e, n) = (1612093, 97059503) and the plain message/signature pair [m, s] = [12345678, 41009275] create another working signature and message pair without factoring the RSA modulus.

  Security measures currently in place give adequate security

Explain in scholarly detail on whether you believe security measures currently in place give adequate security as well as privacy, or do you believe these issues being emphasized are at the expense of the other?

  Discuss the primary security concerns surrounding usb

Discuss the primary security concerns surrounding USB and other portable devices, and prioritize the major risks that your hypothetical friend must consider based on the level of potential harm the identified security concern may cause.

  Find time when station c hears the collision

The size of the frame is long enough to guarantee the detection of collision by both stations. Find: The time when station C hears the collision (t3).

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

  What would you include in your home escape plan

And Michael, you make a great point about "cameras and how inexpensive they have become." Class, how would cameras help with an escape plan and what would you include in your home escape plan?

  Define security infrastructure and protocols

The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust model assumed in SSL, and compare it with the trust model used in Kerberos.

  Security domains of a typical it infrastructure

Analyze the seven security domains of a typical IT infrastructure and determine which two of the seven you would implement first for a nationwide bank. Explain your rationale for your choice.

  It infrastructure management pg assessment item 2enterprise

assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014

  Analyze the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

  Computer program controlling a weapons system

Inspection of a computer program controlling a weapons system shows 54 "if" statements (23 with "else" clauses), 4 "switch" statements

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd