Question

In: Computer Science

Your current infrastructure includes an internet connection, which is connected to the ISP Router, connected to...

Your current infrastructure includes an internet connection, which is connected to the ISP Router, connected to the firewall, connected to the network switch. Within the network you have an online store, a web server that provides internet information for employees only as well a file server that is used to save pet pictures of customers.

More Information

-Online Store – HP Procurve server – average transactions completed – 1500 per day.

-Web Server – Dell EMC server - Portal server that provides store sales report, employee of the month, pet of the month

-File Server – Both the online store and webserver have access to the images located on the file server as well the employees

List the requirements

Below are some questions that will help you start choose the requirements

  1. Will this be a host based, network based or a hybrid based implementation?
    1. Why
  2. How will the IDS detect threats – Signature or Anomaly Based
    1. Why
  3. Are there going to be any IDS Sensors?
    1. Why
  4. Where will you place the IDS; in-band, out-band or both
    1. Why

Solutions

Expert Solution

It is a network based implementation since there is one network only.

IDS will detect threats using Signature Based Detection because we will be matching the traffic to specified threats in the database and this database needs to be updated timley to keep in with new threats.

Yes,there going to be IDS Sensors since it will be using Signature Based detection.These sensors looks for specific, predefined patterns (signatures) in network and compares the traffic to a database of known attacks and triggers an alarm or prevents communication if a match is found. The signature may be based on a single packet or a sequence of packets.

I will place the IDS inline because I want to analyze and inspect every packet that enters my network.IDS placement actually depends upon the need of user , however in the give case the best scenario is to place it inline.All traffic passes through the IDS and the IDS can detect the malicius traffic.


Related Solutions

Java (a) Create a class Router which stores the information of a router. It includes the...
Java (a) Create a class Router which stores the information of a router. It includes the brand, the model number (String) and the price (double, in dollars). Write a constructor of the class to so that the information mentioned is initialized when a Router object is created. Also write the getter methods for those variables. Finally add a method toString() to return the router information in the following string form. "brand: Linksys, model number: RVS4000, price: 1080.0" Copy the content...
2. Identify and describe the two types of ISP service, along with the Internet connection methods,...
2. Identify and describe the two types of ISP service, along with the Internet connection methods, in use today.
Define Internet, Web, HTML, Javascript, Web Page, Ecommerce, and Internet Service Provider ISP) in your own...
Define Internet, Web, HTML, Javascript, Web Page, Ecommerce, and Internet Service Provider ISP) in your own words in one essay.
How does the internet work? When you get a new internet connection in your house what...
How does the internet work? When you get a new internet connection in your house what systems do you see ? How does the wiring work ? where does the wiring in your house connect to ? how does the system connect to the internet ?
An organization’s success begins with building a strong, secure infrastructure, which includes the appropriate policies, procedures,...
An organization’s success begins with building a strong, secure infrastructure, which includes the appropriate policies, procedures, and processes, as well as architecting a scaleable, available, and secure network. Describe the critical components of a cybersecurity architecture. Be sure it provides defense to protect the organization’s data, network, and assets. Explain the function of each component and how each protects the organization. Respond to the following in a minimum of 175 words:
Current asset accounts: • Cash – this is a current asset, which includes cash in bills,...
Current asset accounts: • Cash – this is a current asset, which includes cash in bills, coins, bank balances and checks. • Accounts receivable – Amounts owed from another company for services or products they sold on credit. Current liability accounts: • Accounts payable – Amounts owed to another company for services or products purchased on credit. • Rent payable – Money that is owed to a landlord. Expense accounts • Payroll taxes expense – taxes owed to the state...
List down the basic components of network through which you are connected to internet and troubleshoot...
List down the basic components of network through which you are connected to internet and troubleshoot them each one by starting from your own system using cmd.
The Pew Research Center conducts an annual Internet Project, which includes research related to social networking....
The Pew Research Center conducts an annual Internet Project, which includes research related to social networking. The two‑way table shows the percent of cell phone owners who use a social networking site on their phone, broken down by age, and is based on data reported by Pew as of January 2014. Use social networking on phone Yes No Total Age 18 – 29 228 112 340 Age 30 – 49 281 281 562 Age 50 – 64 106 481 587...
The Pew Research Center conducts an annual Internet Project, which includes research related to social networking....
The Pew Research Center conducts an annual Internet Project, which includes research related to social networking. The two‑way table shows the percent of cell phone owners who use a social networking site on their phone, broken down by age, and is based on data reported by Pew as of January 2014. Use social networking on phone Yes No Total Age 18 – 29 228 112 340 Age 30 – 49 281 281 562 Age 50 – 64 106 481 587...
Which of the following is true regarding the quick ratio Includes inventory in current assets A...
Which of the following is true regarding the quick ratio Includes inventory in current assets A lower ratio means greater liquidity The quick ratio should be lower than the current ratio if a firm holds positive levels of inventory All are true None of the above
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT