+1 (951) 902-6107 info@platinumressays.com

Your custom Assignment is Just a Click Away

We Write Custom Academic Papers

From as Little as $10

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

CYB 6030 Wilmington University Week 3 IDS and IPS Case Study Questions

CYB 6030 Wilmington University Week 3 IDS and IPS Case Study Questions

Question Description

Introduction:

To secure an enterprise network, students must have a good understanding of network security. This week focuses on the six key areas of network security: 1) Understanding and assessing risk, 2) Confidentiality, integrity, and availability (CIA), 3) Defense in-depth, 4) Authentication vs. authorization, 5) Vulnerabilities and 6) Policy. Students will gain both current and historical computer security view of threats and vulnerabilities. An understanding of how threats and vulnerabilities impact confidentiality, integrity, and availability. Security Policies will be discussed that impact operations and end users. Discussions around sound security policies such as password management. Ensuring that policy covers infrastructure, networks and endpoints both Unix and Windows. Incident Handling and Incident Response will also be covered in-depth. Security strategies for defending the enterprise will be discussed both offensive and defensive protection strategies.

Objectives/Learning Outcomes

At the end of the week, students will be able to:

  • Understand the best practices for network security.
    • Develop a deeper understanding of network security, tools, techniques and security architectures.
    • Analyze networking and the security issues associated with internal networks, internet and cloud computing.
    • Apply the essential concepts, algorithms, and protocols as part of network security.
  • Develop hands-on experience with network security tools and defense techniques.
    • Demonstrate proficiency in configuring and operating various network security devices (IPS/IDS).
    • Synthesize defensive computer network tactics, techniques, and procedures.
  • The student will gain an understanding of Incident Response and Forensics.
    • Identify the variables associated with preparation and organization of incident response and tasks to implement.
    • Apply the mechanisms and plans the organization uses to detect an events and incidents.
    • Devise strategies and methods to focus on breach detection and intrusion prevention.
  • Understand defensive network security techniques.
    • Synthesize the tasks used to formulate the network sensing and monitoring.
    • Apply real world scenarios to prepare for business continuity planning.
  • Become familiar with “hacker” motivations and:
    • Analyze the special requirements for dealing with breaches and crises.
    • Develop a response for security challenges.
  • Refine technical writing skills through preparation of research reports and homework assignments.
  • Become familiar with information retrieval and research methods.
    • Access and retrieve information from a variety of electronic databases and other reliable information resources on the World Wide Web (WWW).
    • Construct documented support for group projects and individual research using the retrieved information from the WWW.
    • Use library resources to support group projects and individual research.

Activities and Assignments

  • Week 3 Readings and Resources
  • Week 3 Discussion
  • Week 3 Case Study Questions
  • Week 3 Hands-on Exercise
  • Week 3 Chapter Quiz

Week 3 Readings and Resources

The following readings support this week’s activities. Specific resources are noted with each assignment.

Week 3 Discussion Board

2424 unread replies.2424 replies.

Watch the following videos from the MTA Network Fundamentals 98-366 Training Course: Network Fundamentals 3 and Networking Fundamentals 4.

Networking Fundamentals: 03 Understanding Wired and Wireless Networks (Links to an external site.)

Networking Fundamentals – 04 – The Router: NAT, Firewall, DMZ, Port Forwarding and VPN (Links to an external site.)

  1. Research and discuss the differences of IPv4 vs IPv6
  2. Discuss the differences between public and private IP addresses.
  3. Research and discuss why network time is so critical. How is it set?

Please post your initial response by Wednesday 11:55 and respond to two classmates posts by Sunday 11:55.

Here is the Crowdstrike Article:

https://medium.com/@viveik.chauhan/how-i-bypass-crowdstrike-restriction-1bc558abd464

Week 3 Case Study Questions

Instructions

  1. Save the attached assignment file to your computer.
  2. Read the instructions for the assignment carefully.
  3. Answer all of the questions on the assignment.
  4. Provide Citations and References for all research sources that you use. If you need help with citations and references, click this link: APA Citation Style (Cornell University, 2011). (Links to an external site.)
  5. Upload your competed assignment and submit.

Attachments

Week 3 Hands-on Exercise

Instructions

  1. Save the attached assignment file to your computer.
  2. Read the instructions for the assignment carefully.
  3. Answer all of the questions on the assignment.
  4. Provide Citations and References for all research sources that you use. If you need help with citations and references, click this link: APA Citation Style (Cornell University, 2011). (Links to an external site.)
  5. Upload your competed assignment and submit.

Attachments

How to Place an Order

  1. Clіck оn the Place оrder tab at the tоp menu оr “Order Nоw іcоn at the bоttоm, and a new page wіll appear wіth an оrder fоrm tо be fіlled.
  2. Fіll іn yоur paper’s іnfоrmatіоn and clіck “PRІCE CALCULATІОN” at the bоttоm tо calculate yоur оrder prіce.
  3. Fіll іn yоur paper’s academіc level, deadlіne and the requіred number оf pages frоm the drоp-dоwn menus.
  4. Clіck “FІNAL STEP” tо enter yоur regіstratіоn detaіls and get an accоunt wіth us fоr recоrd keepіng.
  5. Clіck оn “PRОCEED TО CHECKОUT” at the bоttоm оf the page.
  6. Frоm there, the payment sectіоns wіll shоw, fоllоw the guіded payment prоcess, and yоur оrder wіll be avaіlable fоr оur wrіtіng team tо wоrk оn іt.

Nоte, оnce lоgged іntо yоur accоunt; yоu can clіck оn the “Pendіng” buttоn at the left sіdebar tо navіgate, make changes, make payments, add іnstructіоns оr uplоad fіles fоr the оrder created. e.g., оnce lоgged іn, clіck оn “Pendіng” and a “pay” оptіоn wіll appear оn the far rіght оf the оrder yоu created, clіck оn pay then clіck оn the “Checkоut” оptіоn at the next page that appears, and yоu wіll be able tо cоmplete the payment.

Meanwhіle, іn case yоu need tо uplоad an attachment accоmpanyіng yоur оrder, clіck оn the “Pendіng” buttоn at the left sіdebar menu оf yоur page, then clіck оn the “Vіew” buttоn agaіnst yоur Order ID and clіck “Fіles” and then the “add fіle” оptіоn tо uplоad the fіle.

Basіcally, іf lоst when navіgatіng thrоugh the sіte, оnce lоgged іn, just clіck оn the “Pendіng” buttоn then fоllоw the abоve guіdelіnes. оtherwіse, cоntact suppоrt thrоugh оur chat at the bоttоm rіght cоrner

NB

Payment Prоcess

By clіckіng ‘PRОCEED TО CHECKОUT’ yоu wіll be lоgged іn tо yоur accоunt autоmatіcally where yоu can vіew yоur оrder detaіls. At the bоttоm оf yоur оrder detaіls, yоu wіll see the ‘Checkоut” buttоn and a checkоut іmage that hіghlіght pоssіble mоdes оf payment. Clіck the checkоut buttоn, and іt wіll redіrect yоu tо a PayPal page frоm where yоu can chооse yоur payment оptіоn frоm the fоllоwіng;

  1. Pay wіth my PayPal accоunt‘– select thіs оptіоn іf yоu have a PayPal accоunt.
  2. Pay wіth a debіt оr credіt card’ or ‘Guest Checkout’ – select thіs оptіоn tо pay usіng yоur debіt оr credіt card іf yоu dоn’t have a PayPal accоunt.
  3. Dо nоt fоrget tо make payment sо that the оrder can be vіsіble tо оur experts/tutоrs/wrіters.

Regards,

Custоmer Suppоrt

Order Solution Now