PRIYA LR&CFS ASSIGNMENT-7
.docx
keyboard_arrow_up
School
Southeast Missouri State University *
*We aren’t endorsed by this school
Course
650
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by GeneralExploration6683
NAME: PUSHPA PRIYA MIKKILI
SEMO.ID: S02048083
CY-650 Legal, Risk, and Compliance for Security
Assignment-7
1. A key feature of hybrid IDPS systems is event correlation. After researching event correlation online, define the following terms as they are used in this process: compression, suppression, and generalization.
Compression:
Compression in event correlation is the process of reducing a huge number of events into a smaller, more manageable number of occurrences or warnings. This is done to provide insight into the events' underlying causes and therapeutic implications.
Suppression:
Events that are deemed superfluous or unrelated to the current analysis must be
buried or filtered out to achieve this. Suppression helps security personnel focus on the most dangerous threats by reducing the volume of noise in the event stream.
Generalization:
This is intended to be comprehended by grouping several related events into
a single, general category. Instead of treating each event as distinct, generalization groups events according to shared characteristics or behaviors, making it easier to identify trends and
patterns.
2. ZoneAlarm is a PC-based firewall and IDPS tool. Visit the product manufacturer at
www.zonelabs.com, and find the product specification for the IDPS features of ZoneAlarm. Which of the ZoneAlarm products offer these features?
The ZoneAlarm website states that the following ZoneAlarm products have IDPS features:
ZoneAlarm Next-Gen Extreme Security: Provides advanced firewall protection that watches out for dubious activity from apps, as well as a two-way firewall that makes your computer invisible to hackers.
ZoneAlarm Pro Defense & Virus Software:
Includes functions like application control, anti-bot, complex firewall, two-way firewall, and anti-spyware, to name a few.
Firewall ZoneAlarm Pro:
Offers functions including sophisticated firewalling, application control, two-way firewalling, and more.
These products offer multiple security levels, such as safe browsing, content filtering, threat extraction, anti-phishing, anti-keylogger, anti-ransomware, and real-time cloud security.
3. Using the Internet, search for commercial IDPS systems. What classification systems
and descriptions are used, and how can these be used to compare the features and
components of each IDPS? Create a comparison spreadsheet identifying the classification systems you find.
Intrusion system classification includes the following:
Host-Based IDS: This type of intrusion detection system keeps an eye on the network infrastructure it is deployed on, logging malicious activity and analyzing data.
Malicious activity on a network is identified by network-based intrusion detection systems. Hybrid-based IDS: This is achieved by fusing the open-source Snort misuse-based IDS with the anomaly-based packet header anomaly detection (PHAD) and network traffic anomaly detection (NETAD) IDSs.
The intrusion detection system divides the classification into two groups, which are as follows:
Professional networks
Transitional states
Analyzing signatures
IDS based on statistics
Nets for Petri dishes
Data extraction
Intelligent data system (IDS)
Comparison Spreadsheet:
Name License
OS
Type
Based on
Tripwire
enterprise Commercial Windows HIDS
Rule Based
Arc sight Commercial
N/A NIDS Behavior-Based
CSP alert plus
Commercial
Windows
HIDS
Rule Based
eEye Retina
Commercial
Windows
HIDS
Rule Based
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
A null bitmap is used in the variable-length record format to indicate if an attribute has a null value. In rare cases, the majority of a tuple's properties are null. To minimize the cost of a null property to only a single bit, it is possible to change how records are represented.
arrow_forward
A null bitmap is used in the variable-length record format to indicate that an attribute has no value. In a few odd cases, the majority of a tuple's properties are null. It is possible to minimise the cost of a null attribute to a single bit by modifying the way records are represented.
arrow_forward
In the variable-length record format, a null bitmap is used to signal that an attribute has no value.
A tuple's values are frequently empty.
By changing the record representation, it is feasible to reduce the cost of a null attribute to a single bit.
arrow_forward
Program language: Python
Prompt: Create histograms for each feature in a similar way for each of the different classes present in the data.
Data: http://archive.ics.uci.edu/ml/machine-learning-databases/iris/iris.data
arrow_forward
A null bitmap is used to indicate whether an attribute has a null value in the variable-length record
format. Tuples may contain a lot of properties in certain applications, with the majority of them being null.
Is it possible to change the record representation such that the null bitmap's single bit is the sole cost for
a null attribute?
arrow_forward
JSON and CSV are both text-based formats for the storage of data. It's possible to open either
one in a plain text editor. Given this similarity, why does a CSV file usually take less memory than
a JSON formatted file for the same data? Under what conditions could a JSON file be smaller in
memory than a cSV file for the same data?
arrow_forward
In the variable-length record format, a null bitmap is used to indicate if an attribute contains a null value. The bulk of the properties of a tuple are null in some situations. Changing the record representation such that a null attribute's cost is reduced to just a single bit is feasible.
arrow_forward
Data security concerns affect five distinct areas of computer science.
arrow_forward
Internet keyword searches are different from database keyword searches. The two are quite different from one another. What are the primary similarities and differences between the two in terms of the way queries are phrased and the information that is returned, and what are the advantages of each?
arrow_forward
In the variable-length record representation, a null bitmap is used to indicateif an attribute has the null value. For variable-length fields, if the value is null, what would be stored in the offset and length fields?
arrow_forward
Define the term Anonymous Data Types.
arrow_forward
In computer science, what is the difference between normalizing and denormalizing data?
arrow_forward
Several different approaches exist for MDM in databases.
arrow_forward
Explain in a clear and concise manner, why a compressed file is bad for Steganography.
arrow_forward
In the variable-length record format, the existence of a null bitmap is utilised to signal whether or not an attribute has a null value. This may be done both explicitly and implicitly. In this particular scenario, the value of the field would be null; hence, the offset and length fields of variable-length fields would have the value null.
arrow_forward
DAC - Discretionary Access Control
Bob is rather lazy and grants all his data access privileges (including grant) to Joe thinking he can avoid doing his work this way as Joe
is less senior and would be reluctant to complain.
Joe is not happy about this but is also sneaky, Joe hires someone with the moniker "IworkHARD4U" from a gig economy site he got
an email from and sets them up with their own DB id "IworkHARD4" and grants them all the same privileges that Joe has, and
backdoor into the company servers so they can do there work. Sounds legit huh?
One day things go bad, Bob is afraid he will get caught in his work avoidance and quietly runs
REVOKE Bobs_privilege_list ON * FROM Joe RESTRICT;
To hide the trail he created.
Note that this would show up in audit logs, backups, and other traces, but we never said Bob was bright.
Bob notices that things are still changing in his tables and it is not his programs or himself that is changing them.
So does his manager, he is not happy with…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Related Questions
- A null bitmap is used in the variable-length record format to indicate if an attribute has a null value. In rare cases, the majority of a tuple's properties are null. To minimize the cost of a null property to only a single bit, it is possible to change how records are represented.arrow_forwardA null bitmap is used in the variable-length record format to indicate that an attribute has no value. In a few odd cases, the majority of a tuple's properties are null. It is possible to minimise the cost of a null attribute to a single bit by modifying the way records are represented.arrow_forwardIn the variable-length record format, a null bitmap is used to signal that an attribute has no value. A tuple's values are frequently empty. By changing the record representation, it is feasible to reduce the cost of a null attribute to a single bit.arrow_forward
- Program language: Python Prompt: Create histograms for each feature in a similar way for each of the different classes present in the data. Data: http://archive.ics.uci.edu/ml/machine-learning-databases/iris/iris.dataarrow_forwardA null bitmap is used to indicate whether an attribute has a null value in the variable-length record format. Tuples may contain a lot of properties in certain applications, with the majority of them being null. Is it possible to change the record representation such that the null bitmap's single bit is the sole cost for a null attribute?arrow_forwardJSON and CSV are both text-based formats for the storage of data. It's possible to open either one in a plain text editor. Given this similarity, why does a CSV file usually take less memory than a JSON formatted file for the same data? Under what conditions could a JSON file be smaller in memory than a cSV file for the same data?arrow_forward
- In the variable-length record format, a null bitmap is used to indicate if an attribute contains a null value. The bulk of the properties of a tuple are null in some situations. Changing the record representation such that a null attribute's cost is reduced to just a single bit is feasible.arrow_forwardData security concerns affect five distinct areas of computer science.arrow_forwardInternet keyword searches are different from database keyword searches. The two are quite different from one another. What are the primary similarities and differences between the two in terms of the way queries are phrased and the information that is returned, and what are the advantages of each?arrow_forward
- In the variable-length record representation, a null bitmap is used to indicateif an attribute has the null value. For variable-length fields, if the value is null, what would be stored in the offset and length fields?arrow_forwardDefine the term Anonymous Data Types.arrow_forwardIn computer science, what is the difference between normalizing and denormalizing data?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you