Hello Tutors, I need help with the assignments listed below. Please review before accepting the bid. I will be checking for plagiarism! Part a: The Role of IDS in Network Security Prior to beginning work on this discussion, please read Chapters 4 and 5 in the textbook and the Guide to Intrusion Detection and Prevention Systems (IDPS) (Links to an external site.). Intrusion detection systems have fundamental flaws in their designs and functionalities. Intrusion detection does not necessarily prevent intrusions. As more organizations encrypt traffic, it becomes increasingly difficult to track intrusions because IDSs have no capabilities to examine encrypted traffic and are, therefore, unable to recognize problems and create alerts. Engineers rely heavily on IDSs to fight hackers. If configured improperly, the IDS will generate false positive alerts, which can be disastrous to the organization. Too many alerts can cause security administrators to become complacent and overlook important events. Several studies have shown that detections of negative security events can take over six months. In this discussion, you are going to look at the role of IDSs in protecting digital assets. Research a minimum of three industry publications (e.g., National Institute for Standards & Technology [NIST], Institute of Electrical and Electronic Engineers [IEEE], Internet Engineering Taskforce [IETF], etc.) on this topic. Address the differences and similarities between IDS and intrusion protection systems (IPS). Explain some of the difficulties associated with configuring and maintaining IDSs, given the changing pattern of traffic on networks. Considering these issues, explain why organizations rely heavily on IDSs, even though they do not prevent hackers from penetrating an infrastructure. Support your statements with evidence from your sources. Minimum of 250 words. Part b: Using SNORT Prior to beginning work on this interactive assignment, review the resources available from snort.org (Links to an external site.). Snort is an open source IDS software and is available in your virtual lab. For this exercise access your virtual lab environment (Links to an external site.)and follow the step-by-step instructions provided within the lab on how to configure Snort The configuration of Snort will require that you understand the TCP/IP model, therefore, you may wish to review the resources from Week One. Within your configuration, you will create an alert using a provided ICMP rules file. You will also run the ping command to generate the alert. Create a screen capture at the end of each step of the instructions within the virtual lab and save these to a PDF within the lab space. Download the PDF from the virtual lab and submit it through Waypoint for grading. Part c: Intrusion Detection Systems Prior to beginning work on this assignment, please read Chapter 21 in the textbook as well as Chapter 2: Intrusion Detection and Prevention Principles from the NIST Guide to Intrusion Detection and Prevention System (IDPS) (Links to an external site.). Intrusion detection systems (IDSs) are network appliances that detect inappropriate, incorrect and disrupting activities on the network. It provides administrators visibility into the network. Traditionally, these devices have been placed between the border router and the firewalls. This architecture has undergone significant changes in recent years because of the changing nature of malware. Organizations are having to deploy multiple IDSs across the network to detect abnormal activities on infrastructure. Research a minimum of two industry resources (e.g., National Institute for Standards & Technology [NIST], Institute of Electrical and Electronic Engineers [IEEE], and Internet Engineering Taskforce [IETF], etc.) on this topic. (Access the MISM Credible Resource Guide (Links to an external site.) for assistance with finding appropriate credible professional resources.) Use your findings to differentiate between the different types of intrusion detection systems and explain their uses. Describe optimum locations for IDS on a corporate TCP/IP network and explain how IDSs can be used to complement firewalls. The Intrusion Detection System paper Must be 900-1200 words (three page) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center (Links to an external site.). Must include a separate title page with the following: Title of paper Student’s name Course name and number Instructor’s name Date submitted Must use at least three industry and/or US government sources in addition to the course text. Access the MISM Credible Resource Guide (Links to an external site.) for assistance with finding appropriate credible professional resources. You may also see the Ashford Library’s Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) for additional information. Must document all sources in APA style as outlined in the Ashford Writing Center. Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.
Question Attachments
0 attachments —