Question

In: Computer Science

Cybersecurity There are many different network threats nowadays that it's almost impossible to keep up with...

Cybersecurity

There are many different network threats nowadays that it's almost impossible to keep up with every single one of them. There are many different attack vectors that many times a single security product won't fully protect a network. For this discussion find a product or service that you believe every organization should be using to help protect their network environment. Write a couple of paragraphs to discuss the product or service and why you believe it's critical to use it.

Solutions

Expert Solution

Cybersecurity is the practice of protecting the systems from cyber attacks. The objective of the cyber attacks is to steal, destroy or change the information of the computer systems in order to extort money. Nowadays, a lot of advancement is happening and every business is connected to the internet hackers has devised new methods in order to overcome the security systems of the organisation,

There are many products that organisation use but the most effective that I believe that every organisation should implement is: Intrusion Prevention System (IPS)

IPS is a system which checks the network traffic for suspicious activities, collect the information about malicious activities, alerts the administrator when such activities are founded and making attempts in order to block these activities.IPS work by capturing the packets from traffic in real-time to detect suspicious activity. The data packet is checked for suspicious activity and therefore can actively block the packet from reaching the destination.    

Different methods used by IPS to detect Intrusion are:

1) Signature-based Detection- This method makes use of predefined signatures in the form of patterns of generally known threats. When an attack happens whose signature matches with one of the predefined signatures or pattern then the system takes necessary steps to prevent this attack.

2)Anomaly-Based- In this method systems detect suspicious activities through their unexpected or abnormal behaviour in the network. An anomaly can also be thought of as an outlier when the system detects an anomaly it blocks the target host computer.

3)Policy-Based- In this approach, a number of security policies of the organisation are involved the network administrator can configure the policies accordingly to the organisation. When any activity violates the security policy an alert is sent to the network administrator

.If deployed correctly the Intrusion Prevention System (IPS) provides proactive security from most of today's dangerous cyber attacks.


Related Solutions

Nanoelectronic questions: Nowadays, there are many mechanisms used to create nanostructures via bottom-up approach. This approach...
Nanoelectronic questions: Nowadays, there are many mechanisms used to create nanostructures via bottom-up approach. This approach begins with individual atoms and molecules to build up the desired nanostructures, in some cases through smart use of self-assembly. With the aid of a table and diagram, describe the following mechanisms: 1. Chemical vapor deposition (CVD) reaction via a vapor liquid solid (VLS) growing mechanism 2. Molecular beam epitaxy 3. Sol-gel synthesis 4. Laser ablation In the table, please includes the history, process/method,...
A music player or music organization program can keep track of how many different artists are in a library. First note how many different
A music player or music organization program can keep track of how many different artists are in a library. First note how many different artists are in your music library. Then find the probability that if 25 songs are selected at random, none will have the same artist.
You need to set up a network with over 100 workstations. When asking two different vendors,...
You need to set up a network with over 100 workstations. When asking two different vendors, both provided the switches you want, but the price difference is huge. There must be something that makes the price differ that much. But what? What are the consequences if you use a cheaper alternative? What is the threshold of when to use a cheaper switch and when to use the more expensive switch?
Use the list below to answer this question. Wastewater is made up of many different constituents,...
Use the list below to answer this question. Wastewater is made up of many different constituents, which one in your opinion create the greatest risks to human habitation? Natural habitation? Which ones are reasonably inert? Is treatment the only way to prevent these elements from entering the wastewater stream? •water ( > 95%) which is often added during flushing to carry the waste down a drain •Pathogens such as bacteria, viruses, prions and parasitic worms. •Non-pathogenic bacteria(> 100,000 / ml...
Team dynamics are made up of many different aspects, and can be quite complex. This assignment...
Team dynamics are made up of many different aspects, and can be quite complex. This assignment allows you to bring together the concepts that you have learned this week to summarize and apply them to your own life. Write a 200- to 350-word summary on team dynamics. Include the following: Describe the factors that contribute to team dynamics. Explain how team dynamics can affect the productivity and effectiveness of a team. Describe how you can apply this information in your...
Many different ways have been proposed to make batteries. One cell is set up with copper...
Many different ways have been proposed to make batteries. One cell is set up with copper and lead electrodes in contact with CuSO4(aq) and Pb(NO3)2 (aq), respectively. If the Pb2+ and Cu2+ concentrations are each 1.0 M, what is the overall cell potential? Pb2+ + 2e- ---> Pb E = -0.22 V Cu2+ + 2e- ----> Cu E = +0.34 V answer: 0.56 V. how?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT