What is an ips and do we need one in an e-commerce network

Assignment Help Computer Network Security
Reference no: EM131168538

Security Solution

Scenario: Your boss wants to know how to detect an intrusion into or an attack on the e-commerce network. Your boss also wants to know what hardware or software should be procured for intrusion detection.

Write a 2- to 3-page business report (@ 350 wpp) describing the hardware and/or software you believe should be considered for implementation.

Include your reasoning for why the described hardware and/or software should be procured and implemented.

Address the following questions raised by your boss:

Does a properly installed and maintained firewall provide adequate defense against intrusion?

What is an Intrusion Prevention System (IPS) and do we need one in an e-commerce network?

Do we need a group of network personnel to monitor the e-commerce network for intrusions 24/7?

Will any of this hardware or software facilitate a real-time response to an intrusion?

Format your paper consistent with APA guidelines.

Reference no: EM131168538

Questions Cloud

What amount should ridge road report for its equity : How much of Ridge Road's $3,900,000 payment for Sauk Trail is attributable to goodwill? - What amount should Ridge Road report for its equity in Sauk Trail's earnings on its income statements for 2014 and 2015?
What are the characteristics of a good word definition : What are the characteristics of a good word definition? Give an example of a good one and a poor one
What effect might milton poem have : What was most surprising or interesting to you about Milton's Paradise Lost? What effect might Milton's poem have if it were published in the twenty-first century
Summarize the film space odyssey : Please summarize the film Space Odyssey, the 1968 epic science fiction film. Film journals are meant for students to reflect on the themes of the course as they relate to the film screenings
What is an ips and do we need one in an e-commerce network : What is an Intrusion Prevention System (IPS) and do we need one in an e-commerce network? Do we need a group of network personnel to monitor the e-commerce network for intrusions 24/7?
Discuss clinical considerations of the addictive substance : Discuss clinical considerations of the addictive substance or behavior. Include the implications the biological aspects of substance/behavior have for the counseling process. Describe medical treatments (existing or developing) based on biologic..
How do you view the wife of bath : The Wife of Bath's Prologue and Tale by Chaucer: The Wife of Bath has frequently been called the "root of all evil"; she has also been extolled as a feminist, a wise woman, a precursor to the modern businesswoman, and many more things. How do you ..
How much money did she spend on the bananas : Ms. Hart brought 3.5 pounds of bananas at $1.51, a pounds and 4.5 pounds of pineapple for 5.95. How much money did she spend on the bananas and pineapple.
When is the best time to implement a device database : When is the best time to implement a device database? What are the steps Android developers take during implementation? Name three specialized test scenarios that any QA team should consider.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Leaders and managers

One of business' contemporary rules states that organizations should move away from some top leaders and many managers to leaders at every level and few managers.

  What is the plain text m

We assume that Oscar is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any keys but the public one in case of DS - Will Bob detect this

  Describe the attacks associated with wep wpa or bluetooth

Discuss/describe the attacks associated with WEP, WPA, WPA2 or Bluetooth not covered in Module. How can these attacks be detected and prevented?

  Processes on a system share no resources

Assume that processes on a system share no resources. Is it possible for one process to block another processes' access to a resource? Why or why not? From your answer, argue that denial of service attacks are possible or impossible.

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Create list of security issues which the firm must monitor

You decide to create security checklist for New Century. Create list of security issues which the firm must evaluate and monitor. Make sure to organize items into categories which match five security levels.

  Define a secure system in the blp model

How would you define a secure system in the BLP model - A Security Policy is a statement that partitions the states of the system into a set of authorized, or secure, states and a set of unauthorized, or non-secure, states.

  What hacking of memory or hacking of ram means

what hacking of memory or hacking of RAM means

  Design and implementation of a security approach

use Microsoft Powerpoint to create your slides for a 15-minute presentation. It`s about Computer Hacking the same subject that you wrote in the report. You are going to take the same information that you wrote in the report and make it as slides.

  Dscribe three 3 ways in which businesses use internet

assume that you were recently hired by a manufacturing company as a systems administrator trainee. your first

  When applying cryptography determine why securing the key

when applying cryptography determine why securing the key is more important than securing plaintext or ciphertext.

  Difference between enterprise and it architecture

What is the difference between enterprise architecture and IT architecture and should enterprise architecture really be called "IT" architecture?"

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd