Lab #10 - Assessment Worksheet_Kerin

.docx

School

American Public University *

*We aren’t endorsed by this school

Course

262

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by cheyennemaxey97

Report
Answer 1: An IPS and IDS are similar in terms of detection, but an IPS also has response abilities. Answer 2: A baseline creates a pattern of normal behaviors. Answer 3: Sign of a compromised machine. Answer 4: No, these are logged. Answer 5: Host-based monitor machines; network-based monitor networks. Answer 6: Identify the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. Program your IDS and IPS devices to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. All of the normal hacking applications and tools that generate ICMP, IP, UDP, and TCP should also be identified and blocked on your external IDS/IPS device including DoS and DDoS digital signatures. Answer 7: To provide your network and security organization with real-time alertsand alarms pertaining to potential system compromise and/or unauthorized access. Answer 8: Typically, the LAN-to-WAN Domain and Internet ingress/egress point is theprimary location for IPS devices. Second to that would be internal networks That have or require the highest level of security and protection from unauthorized access.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help