SlideShare una empresa de Scribd logo
1 de 5
Scenario/Summary
In this lab, you will explore at least one IDS, IPS, or Honeypot
currently offered by product vendors and cloud service
providers. You will be making a security recommendation,
related to the protection of a target network of your choice.
There are a few different paths you may take in this lab, so let's
address some of the distinguishing features and definitions that
are out there.
IDS and IPS Overview
·
An intrusion detection system (IDS) generally detects and logs
known intrusions or anomalous network activity. Generally, no
real-time protection actually occurs, therefore false-positives
create little or no damage. Optionally, suspicious network
traffic can be routed to an alternate network, such as a
honeypot.
·
An intrusion protection system (IPS) generally detects, logs,
and then blocks known intrusions or anomalous network
activity. False-positives are an issue and will result in a self-
inflicted denial of service condition. Optionally, suspicious
network traffic can be routed to an alternate network, such as a
honeypot.
Honeypot Overview
·
Honeypots come in several broad categories. The most common
labels we apply to them are research honeypots, active
honeypots, and offensive honeypots. They are designed to do
what their label suggests, and here is a brief summary.
Note: Seek qualified legal advice before deploying any type of
honeypot.
·
Research honeypots generally collect and analyze data about the
attacks against a decoy-network. They can also route the
attacker to new decoy-networks, to gather more details about
the potential attacks. The data gathered are used to understand
the attacks and strengthen the potential target networks.
·
Active honeypots have many of the features found in a research
honeypot, but they also hold special content that, once taken by
the attackers, can be used as evidence by investigators and law
enforcement. For example, active honeypots may have database
servers containing a fake bank account or credit card
information.
·
Offensive honeypots are configured with many of the features
of the active honeypots, with one interesting and dangerous
addition: they are designed to damage the attacker. When used
outside of your own network, this type of honeypot can result in
vigilantism, attacks against false-targets, and may result in
criminal charges against the honeypot operators. Offensive
honeypots are not recommended for non-law-enforcement
organizations. However, when used fully within your own
network, this technique can detect and neutralize the attacker.
Any of the above services can be implemented on a privately
managed network, or through a cloud service. The selection of
one platform over another will generally determine where the
specific protection occurs—on your network or in the cloud.
The reason for this lab is to give you an understanding of how
special network technology can be used as a security research
tool, while also providing varying degrees of protection.
Document Authoring Guidelines
Each section will vary in size based on the requirements. Drive
yourself to create a useful document for the direction you have
selected.
Lab Document Framework
·
The Target Network:
Indicate the type of activities and data that it supports in a few
sentences. For example, it is the website for an educational
institution that holds personal academic and financial
information, or it is the network used to control devices in a
chemical plant. Use your imagination, but select something that
is real and meaningful to you.
·
The Protection System:
Select one from the presented list (Step 2), or choose your own
protection technology, if it is highly relevant.
·
The Body of the Management Briefing Document:
See the guidance in Step 3. It is generally about 4 to 10
paragraphs.
·
Citations and Resources Used in this Report:
Tell us where you received external guidance and ideas. If you
have presented original ideas, then give yourself credit, and tell
us why you believe it is correct.
Step 1
Broadly outline the target network. Indicate the type of
activities and data that it supports in a few sentences.
Step 2
Select the protection system. Choose from one of the following.
·
Intrusion detection system (IDS)
·
Intrusion protection system (IPS)
·
Research honeypot
·
Active honeypot
·
Offensive honeypot
Step 3
Create a management briefing document that will inform senior
decision makers about their options, vendors,
products, relevant examples, and issues associated with your
selected protection (from Step 2). If cost can be identified, then
please include that information as well. It is generally about 4
to 10 paragraphs.
Suggested Resources
·
https://www.google.com/search?q=intrusion detection system
reviews
·
http://www.bing.com/search?q=intrusion protection system
reviews
·
https://www.google.com/#q=Research Honeypots
·
https://www.google.com/#q=Active Honeypots
·
http://www.bing.com/search?q=Offensive Honeypot
·
http://www.f5.com/
·
http://www.snort.org/

Más contenido relacionado

Similar a ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx

Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfnoelbuddy
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptuseonlyfortech140
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacksdkaya
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An OverviewIRJET Journal
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfinfosec train
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkIOSR Journals
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Laura Arrigo
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIRJET Journal
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applicationsijtsrd
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourKasper de Waard
 

Similar a ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx (20)

Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Network Security
Network SecurityNetwork Security
Network Security
 
The tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdfThe tops for collecting network based evidenceyou think that your.pdf
The tops for collecting network based evidenceyou think that your.pdf
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.pptFALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
FALLSEM2023-24_BCSE353E_ETH_VL2023240100871_2023-05-25_Reference-Material-I.ppt
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Idps
IdpsIdps
Idps
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
IS - Firewall
IS - FirewallIS - Firewall
IS - Firewall
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 

Más de ronnasleightholm

Scholarly PaperThe purpose of this paper is to explore or inquir.docx
Scholarly PaperThe purpose of this paper is to explore or inquir.docxScholarly PaperThe purpose of this paper is to explore or inquir.docx
Scholarly PaperThe purpose of this paper is to explore or inquir.docxronnasleightholm
 
Schizophrenia is characterized by a variety of communication disorde.docx
Schizophrenia is characterized by a variety of communication disorde.docxSchizophrenia is characterized by a variety of communication disorde.docx
Schizophrenia is characterized by a variety of communication disorde.docxronnasleightholm
 
Scholarly writing has traditions and expectations. It is different f.docx
Scholarly writing has traditions and expectations. It is different f.docxScholarly writing has traditions and expectations. It is different f.docx
Scholarly writing has traditions and expectations. It is different f.docxronnasleightholm
 
Schellhammer Corporation reported the following amounts in 2013, 201.docx
Schellhammer Corporation reported the following amounts in 2013, 201.docxSchellhammer Corporation reported the following amounts in 2013, 201.docx
Schellhammer Corporation reported the following amounts in 2013, 201.docxronnasleightholm
 
Scholar-Practitioner Project Evaluation PlanAlthough many people .docx
Scholar-Practitioner Project Evaluation PlanAlthough many people .docxScholar-Practitioner Project Evaluation PlanAlthough many people .docx
Scholar-Practitioner Project Evaluation PlanAlthough many people .docxronnasleightholm
 
Scenario Prior to completing your full evaluation, you will meet .docx
Scenario Prior to completing your full evaluation, you will meet .docxScenario Prior to completing your full evaluation, you will meet .docx
Scenario Prior to completing your full evaluation, you will meet .docxronnasleightholm
 
Scenario Your manager has asked you to investigate the exposure t.docx
Scenario Your manager has asked you to investigate the exposure t.docxScenario Your manager has asked you to investigate the exposure t.docx
Scenario Your manager has asked you to investigate the exposure t.docxronnasleightholm
 
ScenarioYou have been asked to be the project manager for the deve.docx
ScenarioYou have been asked to be the project manager for the deve.docxScenarioYou have been asked to be the project manager for the deve.docx
ScenarioYou have been asked to be the project manager for the deve.docxronnasleightholm
 
Science diss part 2This response does not need to be more than 3 p.docx
Science diss part 2This response does not need to be more than 3 p.docxScience diss part 2This response does not need to be more than 3 p.docx
Science diss part 2This response does not need to be more than 3 p.docxronnasleightholm
 
ScenarioYou work for Hanson Enterprises, a U.S. based company, w.docx
ScenarioYou work for Hanson Enterprises, a U.S. based company, w.docxScenarioYou work for Hanson Enterprises, a U.S. based company, w.docx
ScenarioYou work for Hanson Enterprises, a U.S. based company, w.docxronnasleightholm
 
SchizophreniaSelectSchizophreniaUse th.docx
SchizophreniaSelectSchizophreniaUse th.docxSchizophreniaSelectSchizophreniaUse th.docx
SchizophreniaSelectSchizophreniaUse th.docxronnasleightholm
 
School leaders have found many benefits from the implementation of a.docx
School leaders have found many benefits from the implementation of a.docxSchool leaders have found many benefits from the implementation of a.docx
School leaders have found many benefits from the implementation of a.docxronnasleightholm
 
Scenario You will be assigned an Emerging Technology research and p.docx
Scenario You will be assigned an Emerging Technology research and p.docxScenario You will be assigned an Emerging Technology research and p.docx
Scenario You will be assigned an Emerging Technology research and p.docxronnasleightholm
 
Explain whether you believe that democracy has worked in Iraq
Explain whether you believe that democracy has worked in Iraq Explain whether you believe that democracy has worked in Iraq
Explain whether you believe that democracy has worked in Iraq ronnasleightholm
 
Explain what particular type of leadership style is needed to begi
Explain what particular type of leadership style is needed to begiExplain what particular type of leadership style is needed to begi
Explain what particular type of leadership style is needed to begironnasleightholm
 
Explain what is meant by Leaders are not born, they are made. Wh
Explain what is meant by Leaders are not born, they are made. WhExplain what is meant by Leaders are not born, they are made. Wh
Explain what is meant by Leaders are not born, they are made. Whronnasleightholm
 
Explain what you believe is the real difference between ‘science’ an
Explain what you believe is the real difference between ‘science’ anExplain what you believe is the real difference between ‘science’ an
Explain what you believe is the real difference between ‘science’ anronnasleightholm
 
Explain the various types of network attacks and their countermeasur
Explain the various types of network attacks and their countermeasurExplain the various types of network attacks and their countermeasur
Explain the various types of network attacks and their countermeasurronnasleightholm
 
Explain the various modes of transmission for HIV. How does HIV conv
Explain the various modes of transmission for HIV. How does HIV convExplain the various modes of transmission for HIV. How does HIV conv
Explain the various modes of transmission for HIV. How does HIV convronnasleightholm
 
Explain to the participants at the conference how ethics plays a l
Explain to the participants at the conference how ethics plays a lExplain to the participants at the conference how ethics plays a l
Explain to the participants at the conference how ethics plays a lronnasleightholm
 

Más de ronnasleightholm (20)

Scholarly PaperThe purpose of this paper is to explore or inquir.docx
Scholarly PaperThe purpose of this paper is to explore or inquir.docxScholarly PaperThe purpose of this paper is to explore or inquir.docx
Scholarly PaperThe purpose of this paper is to explore or inquir.docx
 
Schizophrenia is characterized by a variety of communication disorde.docx
Schizophrenia is characterized by a variety of communication disorde.docxSchizophrenia is characterized by a variety of communication disorde.docx
Schizophrenia is characterized by a variety of communication disorde.docx
 
Scholarly writing has traditions and expectations. It is different f.docx
Scholarly writing has traditions and expectations. It is different f.docxScholarly writing has traditions and expectations. It is different f.docx
Scholarly writing has traditions and expectations. It is different f.docx
 
Schellhammer Corporation reported the following amounts in 2013, 201.docx
Schellhammer Corporation reported the following amounts in 2013, 201.docxSchellhammer Corporation reported the following amounts in 2013, 201.docx
Schellhammer Corporation reported the following amounts in 2013, 201.docx
 
Scholar-Practitioner Project Evaluation PlanAlthough many people .docx
Scholar-Practitioner Project Evaluation PlanAlthough many people .docxScholar-Practitioner Project Evaluation PlanAlthough many people .docx
Scholar-Practitioner Project Evaluation PlanAlthough many people .docx
 
Scenario Prior to completing your full evaluation, you will meet .docx
Scenario Prior to completing your full evaluation, you will meet .docxScenario Prior to completing your full evaluation, you will meet .docx
Scenario Prior to completing your full evaluation, you will meet .docx
 
Scenario Your manager has asked you to investigate the exposure t.docx
Scenario Your manager has asked you to investigate the exposure t.docxScenario Your manager has asked you to investigate the exposure t.docx
Scenario Your manager has asked you to investigate the exposure t.docx
 
ScenarioYou have been asked to be the project manager for the deve.docx
ScenarioYou have been asked to be the project manager for the deve.docxScenarioYou have been asked to be the project manager for the deve.docx
ScenarioYou have been asked to be the project manager for the deve.docx
 
Science diss part 2This response does not need to be more than 3 p.docx
Science diss part 2This response does not need to be more than 3 p.docxScience diss part 2This response does not need to be more than 3 p.docx
Science diss part 2This response does not need to be more than 3 p.docx
 
ScenarioYou work for Hanson Enterprises, a U.S. based company, w.docx
ScenarioYou work for Hanson Enterprises, a U.S. based company, w.docxScenarioYou work for Hanson Enterprises, a U.S. based company, w.docx
ScenarioYou work for Hanson Enterprises, a U.S. based company, w.docx
 
SchizophreniaSelectSchizophreniaUse th.docx
SchizophreniaSelectSchizophreniaUse th.docxSchizophreniaSelectSchizophreniaUse th.docx
SchizophreniaSelectSchizophreniaUse th.docx
 
School leaders have found many benefits from the implementation of a.docx
School leaders have found many benefits from the implementation of a.docxSchool leaders have found many benefits from the implementation of a.docx
School leaders have found many benefits from the implementation of a.docx
 
Scenario You will be assigned an Emerging Technology research and p.docx
Scenario You will be assigned an Emerging Technology research and p.docxScenario You will be assigned an Emerging Technology research and p.docx
Scenario You will be assigned an Emerging Technology research and p.docx
 
Explain whether you believe that democracy has worked in Iraq
Explain whether you believe that democracy has worked in Iraq Explain whether you believe that democracy has worked in Iraq
Explain whether you believe that democracy has worked in Iraq
 
Explain what particular type of leadership style is needed to begi
Explain what particular type of leadership style is needed to begiExplain what particular type of leadership style is needed to begi
Explain what particular type of leadership style is needed to begi
 
Explain what is meant by Leaders are not born, they are made. Wh
Explain what is meant by Leaders are not born, they are made. WhExplain what is meant by Leaders are not born, they are made. Wh
Explain what is meant by Leaders are not born, they are made. Wh
 
Explain what you believe is the real difference between ‘science’ an
Explain what you believe is the real difference between ‘science’ anExplain what you believe is the real difference between ‘science’ an
Explain what you believe is the real difference between ‘science’ an
 
Explain the various types of network attacks and their countermeasur
Explain the various types of network attacks and their countermeasurExplain the various types of network attacks and their countermeasur
Explain the various types of network attacks and their countermeasur
 
Explain the various modes of transmission for HIV. How does HIV conv
Explain the various modes of transmission for HIV. How does HIV convExplain the various modes of transmission for HIV. How does HIV conv
Explain the various modes of transmission for HIV. How does HIV conv
 
Explain to the participants at the conference how ethics plays a l
Explain to the participants at the conference how ethics plays a lExplain to the participants at the conference how ethics plays a l
Explain to the participants at the conference how ethics plays a l
 

Último

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 

Último (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 

ScenarioSummaryIn this lab, you will explore at least one IDS, IP.docx

  • 1. Scenario/Summary In this lab, you will explore at least one IDS, IPS, or Honeypot currently offered by product vendors and cloud service providers. You will be making a security recommendation, related to the protection of a target network of your choice. There are a few different paths you may take in this lab, so let's address some of the distinguishing features and definitions that are out there. IDS and IPS Overview · An intrusion detection system (IDS) generally detects and logs known intrusions or anomalous network activity. Generally, no real-time protection actually occurs, therefore false-positives create little or no damage. Optionally, suspicious network traffic can be routed to an alternate network, such as a honeypot. · An intrusion protection system (IPS) generally detects, logs, and then blocks known intrusions or anomalous network activity. False-positives are an issue and will result in a self- inflicted denial of service condition. Optionally, suspicious network traffic can be routed to an alternate network, such as a honeypot. Honeypot Overview · Honeypots come in several broad categories. The most common labels we apply to them are research honeypots, active honeypots, and offensive honeypots. They are designed to do what their label suggests, and here is a brief summary. Note: Seek qualified legal advice before deploying any type of honeypot. ·
  • 2. Research honeypots generally collect and analyze data about the attacks against a decoy-network. They can also route the attacker to new decoy-networks, to gather more details about the potential attacks. The data gathered are used to understand the attacks and strengthen the potential target networks. · Active honeypots have many of the features found in a research honeypot, but they also hold special content that, once taken by the attackers, can be used as evidence by investigators and law enforcement. For example, active honeypots may have database servers containing a fake bank account or credit card information. · Offensive honeypots are configured with many of the features of the active honeypots, with one interesting and dangerous addition: they are designed to damage the attacker. When used outside of your own network, this type of honeypot can result in vigilantism, attacks against false-targets, and may result in criminal charges against the honeypot operators. Offensive honeypots are not recommended for non-law-enforcement organizations. However, when used fully within your own network, this technique can detect and neutralize the attacker. Any of the above services can be implemented on a privately managed network, or through a cloud service. The selection of one platform over another will generally determine where the specific protection occurs—on your network or in the cloud. The reason for this lab is to give you an understanding of how special network technology can be used as a security research tool, while also providing varying degrees of protection. Document Authoring Guidelines Each section will vary in size based on the requirements. Drive yourself to create a useful document for the direction you have
  • 3. selected. Lab Document Framework · The Target Network: Indicate the type of activities and data that it supports in a few sentences. For example, it is the website for an educational institution that holds personal academic and financial information, or it is the network used to control devices in a chemical plant. Use your imagination, but select something that is real and meaningful to you. · The Protection System: Select one from the presented list (Step 2), or choose your own protection technology, if it is highly relevant. · The Body of the Management Briefing Document: See the guidance in Step 3. It is generally about 4 to 10 paragraphs. · Citations and Resources Used in this Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit, and tell us why you believe it is correct. Step 1 Broadly outline the target network. Indicate the type of activities and data that it supports in a few sentences. Step 2 Select the protection system. Choose from one of the following. · Intrusion detection system (IDS) ·
  • 4. Intrusion protection system (IPS) · Research honeypot · Active honeypot · Offensive honeypot Step 3 Create a management briefing document that will inform senior decision makers about their options, vendors, products, relevant examples, and issues associated with your selected protection (from Step 2). If cost can be identified, then please include that information as well. It is generally about 4 to 10 paragraphs. Suggested Resources · https://www.google.com/search?q=intrusion detection system reviews · http://www.bing.com/search?q=intrusion protection system reviews · https://www.google.com/#q=Research Honeypots · https://www.google.com/#q=Active Honeypots · http://www.bing.com/search?q=Offensive Honeypot