CSIA 485 Project #3 Detailed Assignment Description five pages

User Generated

GhgbeEvtug

Business Finance

Description

Select one of the security technologies you identified in either P1 or P2. Research and evaluate its capabilities, costs, maintenance requirements, flexibility, and feasibility for implementation. The analysis should include pros and cons, potential barriers to success, vulnerabilities eliminated or reduced, convergence issues, first adopters (if the technology is new), and any other issues you deem important to consider. Use the technical evaluation methodology information obtained and discussed in previous courses such as CSIA 303 or 459.

The deliverable for this assignment will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations, and references are not part of the page count but are required for the assignment. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Security Technology

Submitted By: _________________
Dated: ______________

Introduction
A lot of institutions and organizations that heavily rely on systems are bond by budgetary and
labor restrictions. This resource restrictions limit their ability to put in place different
mechanisms or even many similar devices in place which are important for working a
compelling inside out strategy. As we break down this different asset issues surrounding the top
to bottom approach as identified by the IPS/IDS innovation our main aim being the identification
and utilization of innovations agreements as the key for most high to mid valued companies.
The field that deals with identifying and distinguishing wrong, abnormal or mistaken entry into a
system is Interruption Detection.
Intrusion detection tools could be used to analyze and figure out whether PC or server systems
have encountered any form of unauthorized access or interference.
IDS tools and systems should be put in place on each secure server or workstation. IDS tools
investigate and audit document frameworks, local data logs and trail any changes that may have
occurred.
If an infringement on the system happens HIDS alarms are triggered and alert the executive that
set guidelines have been breached.
IDS systems use example to watch and identify reviewed traits or use originally produces
profiles as filters after which they contrast current occurrences and their profiles.
This system is set to drop packets of information or detach information from unapproved sources
that may be deemed harmful or unauthorized.

Page 2

Both interruption recognition and anticipation are key in keeping organizations and institutions
safe.

Network Based IDPS:
Network based IDPS get framework packets (TCP, UDP, and IPX/SPX) and explores them
against signatures and set rules to identify if an event happened or not.
A false positive is where an IDS system is not fully used to the activity to which it is trying to
separate. Network based IDPS are mostly used for passive systems that don’t have a fixed type
of intrusion system in operation.
These IDPS types are able to easily secure networks against any type of assaults that can be
unclear to attackers. The sensors can eith...


Anonymous
Super useful! Studypool never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags