Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The network below belongs to a small - sized pharmaceutical company researching vaccines. The methods and products developed in this company are at the target

The network below belongs to a small-sized pharmaceutical company researching vaccines. The
methods and products developed in this company are at the target of state-sponsored hacker groups.
Although database server is the primary critical asset that stores intellectual property and webserver is
used to access the data by authorized users from the Internet, the attack surface includes all of the
assets you see in the figure.
Assets (Attack surface): Database server, user workstations, internal & DMZ switch, Webserver, DNS
server, firewall, router, and company employees.
As a result, hackers have been trying all possible ways of exploiting vulnerabilities in these assets.
Moreover, the activities of internal employees should also be observed, and it should be confirmed that
they follow the need-to-know principle and don't perform malicious activities.
Select one of the following monitoring tools that also have strong network security monitoring
capabilities. Please carefully review the website of the software you chose.
Nagios
Cacti
Solarwinds
Explain how this network monitoring tool helps security administrators in detecting the following cases.
Feel free to provide the names of the modules/plugins/agents of the selected tool. Select at least three
attack case for your answer.
Hackers are scanning externally visible IP addresses of the company.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Structured Search For Big Data From Keywords To Key-objects

Authors: Mikhail Gilula

1st Edition

012804652X, 9780128046524

More Books

Students also viewed these Databases questions

Question

1.The difference between climate and weather?

Answered: 1 week ago

Question

1. What is Fog ?

Answered: 1 week ago

Question

How water vapour forms ?

Answered: 1 week ago

Question

What is Entrepreneur?

Answered: 1 week ago

Question

Which period is known as the chalolithic age ?

Answered: 1 week ago