week 2

docx

School

University of Phoenix *

*We aren’t endorsed by this school

Course

515

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by patchoulli

Report
1. Low budgets 2. Threshold monitoring(setting up parameter for acceptable use 3. It should be blocked because such traffic is often used to do port scans and flood attacks 4. SPI/application gateway hybrid(check point 5. Anomaly detection (ids is the cisco sensor) 6. AES and 3DES 7. Circuit level gateway(private virtual connection) 8. It examines the source IP of all packets 9. Proxy server 10. Low cost 11. Review firewall logs 12. Built in IDS(d-link 2560 13. Executable profiling(how apps use rresources 14. Multiple operating systems 15. It is inexpensive or free 16. Built in NAT(PC firewalls 17. Intrusion deflection(attract intruders 18. Honeypot 19. Unbiased information might be hard to find 20. Its authentication method takes more time and resources 21. It hides internal network addresses 22. A port scan 23. Stateful packet inspection(Sonicwall TZ) 24. Proxy server 25. Intrusion deterrence (appear less appealing 26. A visual tool to track attacks(McAfee 27. Screened host (combo firewalls 28. Banishment vigilance(preemptive blocking 29. Extensive training available on the product 30. Application gateway(authorixed to connect) 31. Packet filtering (snort 32. Windows 2000 internet connection firewall 33. It yields many false positives 34. Vulnerabilty scanning (not in ICF 35. Router based(preconfigured) 36. Host based(snort 37. Packet filter, app gateway, circuit level, stateful packet inspection 38. Router-based (check point 50000 39. Skilled tech personel are available 40. Stateful packet inspection (most secure)
41. Intrusion detection system 42. It requires client side configs 43. They should unless she is running a web server on her machine 44. It examines each packet in the context of previous packets 45. It might fascinate hackers and keep them online long enough to catch them 46. Ptotocol type, source port, destination port, source ip 47. System monitoring (not a profiling strategy 48. Operating system securitynflaws
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help