Hello Tutors,
I need help with the assignments listed below. Please review before accepting the bid. I will be checking for plagiarism!
Part a:
The Role of IDS in Network Security
Prior to beginning work on this discussion, please read Chapters 4 and 5 in the textbook and the Guide to Intrusion Detection and Prevention Systems (IDPS) (Links to an external site.).
Intrusion detection systems have fundamental flaws in their designs and functionalities. Intrusion detection does not necessarily prevent intrusions. As more organizations encrypt traffic, it becomes increasingly difficult to track intrusions because IDSs have no capabilities to examine encrypted traffic and are, therefore, unable to recognize problems and create alerts. Engineers rely heavily on IDSs to fight hackers. If configured improperly, the IDS will generate false positive alerts, which can be disastrous to the organization. Too many alerts can cause security administrators to become complacent and overlook important events. Several studies have shown that detections of negative security events can take over six months.
In this discussion, you are going to look at the role of IDSs in protecting digital assets. Research a minimum of three industry publications (e.g., National Institute for Standards & Technology [NIST], Institute of Electrical and Electronic Engineers [IEEE], Internet Engineering Taskforce [IETF], etc.) on this topic. Address the differences and similarities between IDS and intrusion protection systems (IPS). Explain some of the difficulties associated with configuring and maintaining IDSs, given the changing pattern of traffic on networks. Considering these issues, explain why organizations rely heavily on IDSs, even though they do not prevent hackers from penetrating an infrastructure. Support your statements with evidence from your sources.
Minimum of 250 words.
Part b:
Using SNORT
Prior to beginning work on this interactive assignment, review the resources available from snort.org (Links to an external site.).
Snort is an open source IDS software and is available in your virtual lab. For this exercise access your virtual lab environment (Links to an external site.)and follow the step-by-step instructions provided within the lab on how to configure Snort The configuration of Snort will require that you understand the TCP/IP model, therefore, you may wish to review the resources from Week One. Within your configuration, you will create an alert using a provided ICMP rules file. You will also run the ping command to generate the alert. Create a screen capture at the end of each step of the instructions within the virtual lab and save these to a PDF within the lab space. Download the PDF from the virtual lab and submit it through Waypoint for grading.
Part c:
Intrusion Detection Systems
Prior to beginning work on this assignment, please read Chapter 21 in the textbook as well as Chapter 2: Intrusion Detection and Prevention Principles from the NIST Guide to Intrusion Detection and Prevention System (IDPS) (Links to an external site.).
Intrusion detection systems (IDSs) are network appliances that detect inappropriate, incorrect and disrupting activities on the network. It provides administrators visibility into the network. Traditionally, these devices have been placed between the border router and the firewalls. This architecture has undergone significant changes in recent years because of the changing nature of malware. Organizations are having to deploy multiple IDSs across the network to detect abnormal activities on infrastructure.
Research a minimum of two industry resources (e.g., National Institute for Standards & Technology [NIST], Institute of Electrical and Electronic Engineers [IEEE], and Internet Engineering Taskforce [IETF], etc.) on this topic. (Access the MISM Credible Resource Guide (Links to an external site.) for assistance with finding appropriate credible professional resources.) Use your findings to differentiate between the different types of intrusion detection systems and explain their uses. Describe optimum locations for IDS on a corporate TCP/IP network and explain how IDSs can be used to complement firewalls.
The Intrusion Detection System paper
Must be 900-1200 words (three page) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center (Links to an external site.).
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least three industry and/or US government sources in addition to the course text.
Access the MISM Credible Resource Guide (Links to an external site.) for assistance with finding appropriate credible professional resources. You may also see the Ashford Library’s Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) for additional information.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more