.

Monday, May 20, 2019

Information Security Fundamentals Essay

Answer the following questions. Use complete sentences.1. How does a fictional positive consternation differ from a false negative one? From a security perspective, which is least desirable? A false positive attack is where the system IDPS was alarmed but no attack ever occurred. The false negative is where an actual attack occurs and the IDPS isnt alarmed at all. The least desirable would definitely be the false negative, if an attack does occur and the IDPS doesnt even alarm well whats the point in even having it if it isnt going to alarm.2. What is a honeypot? How is it different from a honeynet? A honeypot is a decoy system that will lure potential hackers away from the networks critical systems. A honeynet is where the system subnet is invariably changing and it lures attackers away by redirecting the the subsystems that are rich in information.3. What capabilities should a wireless security toolkit embroil? Definitely should be able sniff incoming packets, scan the wireless hosts, and be able to forecast the level of privacy. Keeping an eye on vulnerability is a must because wireless networks can be a little easier to breach especially if the right security measures are not implemented.4. A find feature of hybrid IDPS systems is event correlation. After researching event correlation online, define the following terms as they are used in this process compression, suppression, and generalization. Compression is when it will take several occurrences and will assure it two-fold duplicates. Suppression is where the IDPS will just alert you if something major has happened instead of it just triggering off something simpleton it will still let you know that something triggered it. Associates alarms with higher leveled events, can be useful when corresponding with multiple failed ports.5. ZoneAlarm is a PC-based firewall and IDPS tool. Visit the product manufacturer at www.zonelabs.com, and find the product specification for theIDPS features of ZoneAlarm. Which of the ZoneAlarm products offer these features?6. development the Internet, search for commercial IDPS systems. What classification systems and descriptions are used, and how can these be used to compare the features and components of each IDPS? construct a comparison spreadsheet identifying the classification systems you find.7. Use the Internet to find vendors of thumbprint and iris scanning tools. Which of these tools is more economic? Which of these is least intrusive?8. There are several online passphrase generators available. Locate at least two of them on the Internet, and try them out. What did you observe?

No comments:

Post a Comment