Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

The myth of the firewall as the protector of the internal network has been effectively debunked. In modern networking in particular, demanding users and the

The myth of the firewall as the protector of the internal network has been effectively debunked. In modern networking in particular, demanding users and the race-to-market share tip the balance of border security on the side of users and functions. In addition, those who would exploit and destroy information assets have become increasingly sophisticated in crafting malware that exploits Port 80 and other commonly used ports that have to be made available to users. There are several lines of defense available to network and security administrators, including intrusion prevention and detection technologies. The nature of malware and vulnerability exploits is that there is nearly always a lag time between the discovery of the vulnerability and the creation and application of the fix that will mitigate that vulnerability. It is also true that network and security administrators are too often faced with too much work and not enough resources and are, in the end, human beings. The activities and tools that are available to monitor and test the security levels on a modern network are varied. They range from free open source to very expensive and sophisticated technologies. They come in single-use solutions and best-of-breed solutions, which are typically "Swiss Army knife" solutions that perform a variety of activities.

Complete the Toolwire lab, use the study materials, and engage in any additional research needed to fill in knowledge gaps. Write a 23 page paper that covers the following:

What are the criteria that a network or security administrator should use when selecting the proper network monitoring tool?

How do security managers allow technical staff to have access to these monitoring tools while ensuring that they are not misused?

What determines whether the use of network monitoring tools is beneficial or exploitative in nature?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Information And Database Systems Asian Conference Aciids 2012 Kaohsiung Taiwan March 2012 Proceedings Part 2 Lnai 7197

Authors: Jeng-Shyang Pan ,Shyi-Ming Chen ,Ngoc-Thanh Nguyen

2012th Edition

3642284892, 978-3642284892

More Books

Students explore these related Databases questions

Question

Define misclassification error.

Answered: 3 weeks ago

Question

What is the Big Bang Theory?

Answered: 3 weeks ago