Question

In: Computer Science

Use the Internet to research IDS and Vulnerability Management and Assessment Tools. Find at least six...

Use the Internet to research IDS and Vulnerability Management and Assessment Tools. Find at least six (6) tools for each security tool category, with a minimum of three (3) Open Source and three (3) Commercial for each category of tools (6 IDS and 6 Vulnerability Management).

write a paragraph explaining which tool you prefer or will recommend for your company (one statement for each category, open source vs commercial). What is your logic behind your choice?

Solutions

Expert Solution

IDS (Intrusion Detection System) tools :

S. No Open Source Commercial
1 OSSEC (Open Source Security) Snort
2 SGuil SolarWinds Security Event Manager
3 AIDE (Advanced Intrusion Detection Environment) Splunk

Factors influencing choice of IDS tools:

For open source solutions:

  • Platforms supported (Windows, Mac, Linux etc..)
  • Community support
  • Type of industry, helping in choosing HIDS (Host based IDS) or NIDS (Network based IDS) based solutions

For commercial solutions:

  • Platforms supported (Windows, Mac, Linux etc..)
  • Cost of the product package and features offered
  • SLA(Service Licence Agreement) in case of any queries/assistance required
  • Reporting formats and comprehensibility

The choice for the best IDS tool for any organisation will depend on mix of above factors. It is recommended to judge each tool on the above parameters and choose a mix of tools which provides maximum features and maximum coverage on host as well as network.

Vulnerability Management and Assessment Tools :

S. No Open Source Commercial
1 Nmap VeraCode
2 Wireshark Qualys FreeScan
3 Metasploit PenTest WebServe Vulnerability Scanner

Factors influencing choice of Vulnerability Management and Assessment tools:

For open source solutions:

  • Platforms supported (Windows, Mac, Linux etc..)
  • Community support
  • Whether host based, network based or database based vulnerabilities are to be scanned

For commercial solutions:

  • Platforms supported (Windows, Mac, Linux etc..)
  • Cost of the product package and features offered
  • SLA in case of any queries/assistance required
  • Reporting formats and comprehensibility
  • Duration in which vulnerability database is updated

The choice for the best Vulnerability Management tool for any organisation will depend on mix of above factors. It is recommended to judge each tool on each of the above criteria and evaluate which tool will cover maximum types of vulnerabilities.


Related Solutions

93). Conduct research using the Internet and identify the type of software or management tools that...
93). Conduct research using the Internet and identify the type of software or management tools that you would utilize to help with each of the major steps in developing the project plan. Summarize the software/suite selected and identify its key capabilities, advantages and disadvantages.
Use the Internet to research the annual report of at least one (1) merchandising company. For...
Use the Internet to research the annual report of at least one (1) merchandising company. For example, while you can’t use this one, here is one from Walmart Determine which costing method (Last In First Out [LIFO], First In First Out [FIFO], or weighted average cost) that is used to record inventory by your selected company. Share three (3) advantages and three (3) disadvantages of using the type of costing method (LIFO, FIFO, and weighted average) that the company has...
Please respond to the following: Use the Internet or Strayer Library to research at least two...
Please respond to the following: Use the Internet or Strayer Library to research at least two companies that have experienced downgrades related to stock performance or bond ratings within the last five years. Analyze the primary ways in which auditors would use the information from downgrades to assess business risk or evaluate the likelihood that the downgrades would impact the auditor's assessment of the client's business environment. Ascertain the major ways in which this information would impact the audit risk...
My choice is Dairy Queen Use the Internet to research the annual report of at least...
My choice is Dairy Queen Use the Internet to research the annual report of at least one (1) merchandising company. For example, while you can’t use this one, here is one from Walmart. Determine which costing method (Last In First Out [LIFO], First In First Out [FIFO], or weighted average cost) is used to record inventory by your selected company. Share three (3)advantages and three (3)disadvantages of using the type of costing method (LIFO, FIFO, and weighted average) that the...
Use the Library or the Internet to research and find a situation where probabilities might be...
Use the Library or the Internet to research and find a situation where probabilities might be useful in daily life or in your chosen career. Complete the following: Explain in detail how probabilities are used in the situation you chose.What makes probabilities useful in this situation? Do these probabilities affect decision making in this situation? Explain your answer.Give a specific example of how probabilities are used in this situation.How are probabilities important to decision making in this situation? If they...
What is vulnerability assessment useful for, what are its functions, and what do you find the...
What is vulnerability assessment useful for, what are its functions, and what do you find the most challenging about them?
•Use the Internet to research a business failure determine the level of responsibility management had for...
•Use the Internet to research a business failure determine the level of responsibility management had for the business failure you researched. Provide specific examples to support your response. •Create a list of three best practices that not only would have helped the company you researched from failure, but would also apply to the rest of the industry your company was part of. Explain your rationale for selecting these best practices.
Use the Internet or Strayer Library to research at least two(2) companies that have experienced...
Use the Internet or Strayer Library to research at least two (2) companies that have experienced downgrades related to stock performance or bond ratings within the last five (5) years. Next, analyze the primary ways in which auditors would use the information from downgrades to assess business risk or evaluate the likelihood that the downgrades would impact the auditor's assessment of the client's business environment. Ascertain the major ways in which this information would impact the audit risk model equation....
•Use the Internet or Strayer Library to research at least two (2) companies that have experienced...
•Use the Internet or Strayer Library to research at least two (2) companies that have experienced downgrades related to stock performance or bond ratings within the last five (5) years. Next, analyze the primary ways in which auditors would use the information from downgrades to assess business risk or evaluate the likelihood that the downgrades would impact the auditor's assessment of the client's business environment. Ascertain the major ways in which this information would impact the audit risk model equation....
Use the Internet to research the annual report of at least one (1) merchandising company. Determine...
Use the Internet to research the annual report of at least one (1) merchandising company. Determine which costing method (Last In First Out [LIFO], First In First Out [FIFO], or weighted average cost) is used to record inventory by your selected company. Share three (3) advantages and three (3) disadvantages of using the type of costing method (LIFO, FIFO, and weighted average) that the company has implemented. Provide support
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT