We're Open
+44 7340 9595 39
+44 20 3239 6980

[Solved] Incident Response for Linux and Microsoft Workstations & SNORT as an Intrusion Detection System

  100% Pass and No Plagiarism Guaranteed

[Solved] Incident Response for Linux and Microsoft Workstations & SNORT as an Intrusion Detection System

In this paper, you are asked to present a report on an Incident Response for Linux and Microsoft Workstations & SNORT as an Intrusion Detection System. You are required to answers all the questions mentioned below in your report.

Incident Response for Linux and Microsoft Workstations & SNORT as an Intrusion Detection System

When you are notified that a user’s workstation or system is acting strangely and log files indicate system compromise, what is the first thing you should do to the workstation or system and why?

2. When an anti-virus application identifies a virus and quarantines this file, does this mean the computer is eradicated of the virus and any malicious software?

3. Where would you check for processes and services enabled in the background of your Student VM workstation?

4. Where would log files typically be kept on most Linux systems?

5. What is the SANS Institute’s 6 step incident handling process?

6. What is the risk of starting to contain an incident prior to completing the identification process?

7. Why do you want to have the incident response handled by the security incident response team and not the IT organization?

8. Do you think it is a good idea to have a security policy defining incident response process in your organization?

9. Why should internal legal counsel be notified when a “Critical” security incident occurs?

10. The post-mortem, lessons learned step is the last in the incident response process. Why is this the most important step in the process?

PART 2:
1. What is the difference between an IDS or an IPS?

2. Why is it important to perform a network traffic baseline definition analysis?
3. Why is a port scan detected from the same IP on a subnet an alarming alert to receive from your IDS?

4. If the SNORT IDS captures the IP packets off the LAN segment for examination, is this an example of promiscuous mode operation? Are these packets saved or logged?

5. What is the difference between network –based IDS and a host-based IDS systems?

6. What are some weaknesses of an IDS/IPS solution at an Internet ingress/egress point in the LAN-to-WAN Domain?

7. Why is it important to tune IDS/IPS systems?

8. How can you prevent attackers performing reconnaissance and probing using Nmap and Nessus® port scanning and vulnerability assessment scanning tools?

9. Why is it a good idea to have host-based IDS’ enabled on critical servers and workstations?

10. Where should you implement IPS’ in your IT infrastructure?

 


100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

STILL NOT CONVINCED?

View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates

Details

  • Title: [Solved] Incident Response for Linux and Microsoft Workstations & SNORT as an Intrusion Detection System
  • Price: £ 89
  • Post Date: 2021-10-28T03:42:53+00:00
  • Category: Assignment Queries
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

[Solved] Incident Response for Linux and Microsoft Workstations & SNORT as an Intrusion Detection System [Solved] Incident Response for Linux and Microsoft Workstations & SNORT as an Intrusion Detection System
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I have tried other sites for assignment help but the result that Insta Research has produced outweighs others. Since I am weak at writing and shaping the data logically, I am glad I took help from this site. Thanks to my writer for such a great quality of the assignment in Business.
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

Oh my god! This writing company has saved me from so many bothering and figured out my problem in the best way possible. I am not fond of reading and when this book review was given to me as part of my coursework, I went into depression. But I must say, my writer came up with an amazing book review covering all the major aspects of the book nicely. I am waiting for other assignments to come so that I would come here again. The place is good and quite reasonable as well which makes it easy for me to manage my budget.