Intrusion detection week 8 assignment

docx

School

Kenyatta University *

*We aren’t endorsed by this school

Course

SIT 306

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

6

Uploaded by ProfessorProtonWombat25

Report
Intrusion detection week 8 assignment 1 Intrusion Detection and Response Reflection Summary Student’s Name: School Affiliation: Professor’s Name: Course Name: Date:
Intrusion detection week 8 assignment 2 Introduction The procedures needed to stop and identify attacks launched by intruders are examined in a reflection of ISSC 642 Intrusion Detection and Incident Handling. The first week's readings covered the traits of an intruder and network security monitoring. In the first week, one was required to comprehend what Network Security Monitoring and Intrusion Detection entailed. The DoD Dir 8570.1 Information and Assurance Workforce Improvement Program had to be read by individuals. The students were introduced to one another in the forum. The forum from Week Two asked participants to discuss threat models, implementation considerations, and network security monitoring tools. Deployment issues when Network Security Monitoring is used to get complete content data were covered in the forum for week two of the course. The focal points of Week Three’s learning objectives were understanding statistical data, session data, and the methods used to acquire the data. The goal of the third forum week was to explain the differences between statistical data, complete content data, session data, and the technologies used to collect the data. The forum task for week four was to distinguish between alert data, which included generation tools, and previously mentioned NSM monitoring, which also included collecting tools. In week four, the class read about alert data and alert data tools. The participants also completed a midterm exam and a summary of an idea paper during week 4. The classus covered a variety of methods for detecting, evaluating, protecting, and responding to security monitoring in week five. Killing with Keyboards File was the topic of debate on the forum in Week 5; for this project, one was to identify potential dangers, weaknesses, and risks associated with using open, free WiFi. The basics of DNS were covered in the reading for week 6; the participants also identified Normal, Malicious, and Suspicious Port 53 Traffic. Describing session data from distinct
Intrusion detection week 8 assignment 3 segments was the learning objective. The forum from week six asked participants to categorize any network activity as Normal, Suspicious, or Malicious. The forum from Week Seven participants studied the concepts of Intruders versus Network Security. The panel from Week Seven asked participants to identify the many strategies hackers take to escape detection, such as disguising their identity and spoofing their address. The class must also recognize hackers’ various tools to access a system. Packit Tool Kit, IP Sorcery, LFT, and Fragroute are tools they utilize; the forum assignment was to define the various tools and what they are. Week 8's assignment, "Social Engineering: Anatomy of a Hack," discussed how simple it was to enter a company's network system. The class learned specifics about how simple it was to breach a computer system from a security professional. Chris, a network consultant, ran a penetration test to determine how far he could get into the company's network and servers and quickly gained access to its secrets. My course experience My experience in this course has been eye-opening; it has taught me how to spot intrusions and deal with situations. The concepts of intrusion detection, numerous detection tools to utilize in an incursion, and how to identify and profile invaders might all be examined and evaluated by me. I'm so fascinated by what I've discovered that I want to earn a master's degree in cybersecurity. Identify and explain the course's relevant conceptual material (theories, concepts). The way to deal with situations occurring in a computer system, or to organize and analyze them for signs of realistic episodes, which are violations or unavoidable risks of breaches of PC security procedures, effective employed strategies, or standard security practices, is to use interruption identification or intrusion detection from this course.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Intrusion detection week 8 assignment 4 According to Islam et al. (2019), the path of interruption detection and attempting to halt specific occurrences is interruption aversion, also known as intrusion detection. According to Vieira et al. (2019) , potential personal events are the main focus of interruption discovery and aversion frameworks, which record information about them, seek to prevent them, and alert security chiefs to them. According to Camacho et al. (2019), Intrusion Detection Prevention Systems are used by associations to prevent intrusions for a variety of reasons, including resolving individual security provision problems, documenting current threats, and deterring security provision abuse. Nearly every association's security foundation now includes IDPSs as a necessary addition. While a network-based intrusion prevention system (NIPS) is produced to go one step further and attempt to stop the attack from proceeding, a network-based intrusion recognition method is made to monitor traffic passively and raise alarms when malicious activity is identified. According to Gao (2019), the (NIPS) Network Intrusion Protection System is typically inserted in line with the traffic it monitors to accomplish this. Each network packet is examined before being sent on, and if it doesn't trigger an alarm based on a signature match or anomaly guideline, it is not passed on. Untrustworthy packets are dropped, and a signal is set off. How the course concept/idea/theory may change your future actions/activities. The concepts, ideas, and theories from this course will change my future actions and activities when utilizing WiFi and social media. I would not be using public WiFi any longer. Due to how this class has impacted how I view the internet and how simple it is for me or someone else to act, I will be more cautious when posting on social media.
Intrusion detection week 8 assignment 5 Computer networks were initially developed to communicate with gadgets and share information. Examining, accessing, and sharing material via communication networks (such as the Internet) has become a part of individuals’ daily lives thanks to significant advancements in electronics and network transaction technologies over the past few decades. According to Vieira et al. (2019) , p reventing unauthorized usage, access, and invasion has become essential for all data systems and connection networks since a significant portion of this material is frequently confidential or has restricted access only for appropriate persons. One of these kinds of safety instruments for network security is an intrusion detection system (IDS). Conclusion In conclusion, since it keeps an eye out for hostile behavior, intrusion detection systems are a tool that all agencies should adequately employ. IDS that use signatures to identify attacks do so by examining particular patterns, including network traffic's byte sequences. This training has been one of my best experiences because I now know what to look for online.
Intrusion detection week 8 assignment 6 References Camacho, J., García-Giménez, J. M., Fuentes-García, N. M., & Maciá-Fernández, G. (2019). Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle. Computers & Security, 87, 101603. Gao, J., Chai, S., Zhang, B., & Xia, Y. (2019). Research on network intrusion detection based on incremental extreme learning machine and adaptive principal component analysis. Energies, 12(7), 1223. Islam, S. R., Eberle, W., Ghafoor, S. K., Siraj, A., & Rogers, M. (2019). Domain knowledge aided explainable artificial intelligence for intrusion detection and response —arXiv preprint arXiv:1911.09853. Vieira, K., Koch, F. L., Sobral, J. B. M., Westphall, C. B., & de Souza Leão, J. L. (2019). Autonomic intrusion detection and response using big data. IEEE Systems Journal, 14(2), 1984-1991.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help