StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber security - Coursework Example

Cite this document
Summary
If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Cyber security
Read Text Preview

Extract of sample "Cyber security"

Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend?If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002).

However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with the risks out of need. In this scenario, getting knowledge of previous intrusions and other organizations’ reaction or solutions will be ready to lend a hand in outlining the business case for intrusion detection products. Additionally, they should also be aware of the advantages and opportunities offered by intrusion detection with a wide-ranging awareness with the intrusion detection solutions and products presently available in the market.

In addition, they should also recognize the basic objectives and goals of the intrusion detection products. In view of the fact that Intrusion detection will be a costly activity or investment, even though they make use of an open source solution hence they need to spend an adequate amount of time to investigate, get, build up and put into practice to be far less than the in the general routine management of the information (Bandy, Money, & Worstell, Intrusion Detection FAQ: Getting Started, 2013).2. Under what conditions should you consider implementing a honeypot?

And, under what conditions should you not operate a honeypot?A "honeypot" is a very useful tool for protecting networks from not permitted access. In fact, the honeypot does not encompass applications or data that is vital to the business organization but it contains an adequate amount of attractive data to attract a hacker (SANS, 2013). In view of the fact that a honeypot is only a system tool or application or file that has entirely no reason in production hence it can be assumed that if the honeypot is accessed, there might be some reason that is not linked to a specific business corporation on purpose (Bandy, Money, & Worstell, Intrusion Detection FAQ: What is a honeypot?

Why do I need one?, 2013). It is an admitted fact that the honeypots can be very helpful to business corporations that have considerable resources to maintain them. However, if an organization does not have a security expert to strictly keep an eye on a honeypot the organizations has, at finest, built a susceptible platform that is not checked regularly as well as at worst, a platform that can be occupied and employed by any hacker to attack other systems. Moreover, there is a possible legal responsibility inbuilt in executing deliberately susceptible systems (SANS, 2013).

ReferencesBandy, P., Money, M., & Worstell, K. (2013). Intrusion Detection FAQ: Getting Started. Retrieved February 03, 2013, from http://www.sans.org/security-resources/idfaq/getting_started.phpBandy, P., Money, M., & Worstell, K. (2013). Intrusion Detection FAQ: What is a honeypot? Why do I need one? Retrieved February 03, 2013, from http://www.sans.org/security-resources/idfaq/honeypot2.phpBloedorn, E., Christiansen, A. D., Hill, W., Skorupka, C., Talbot, L. M., & Tivel, J. (2002). Data Mining for Network Intrusion Detection: How to Get Started.

Retrieved January 30, 2013, from http://cgi.di.uoa.gr/~rouvas/research/bloedorn_datamining.pdfOwen, D. (2013). Why should I not run a honeypot? Retrieved February 03, 2013, from SANS.Org: http://www.sans.org/security-resources/idfaq/honeypot4.phpSANS. (2013). Intrusion Detection FAQ: What is a honeypot and how is it used? Retrieved February 03, 2013, from http://www.sans.org/security-resources/idfaq/honeypot.php

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber security Coursework Example | Topics and Well Written Essays - 250 words - 1”, n.d.)
Cyber security Coursework Example | Topics and Well Written Essays - 250 words - 1. Retrieved from https://studentshare.org/information-technology/1614071-cyber-security
(Cyber Security Coursework Example | Topics and Well Written Essays - 250 Words - 1)
Cyber Security Coursework Example | Topics and Well Written Essays - 250 Words - 1. https://studentshare.org/information-technology/1614071-cyber-security.
“Cyber Security Coursework Example | Topics and Well Written Essays - 250 Words - 1”, n.d. https://studentshare.org/information-technology/1614071-cyber-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber security

Cyber Security Vulnerabilities and Associated Threats

This paper ''cyber security Vulnerabilities and Associated Threats'' discusses that cyber threat has remained a top concern in most nations because of security concerns.... Research and study have found out that cyber security has continued to increase in intensity and sophistication with time.... Research and study have found out that cyber security has continued to increase in intensity and sophistication with time.... Cyber threat has remained a top concern in most nations because of security concerns....
7 Pages (1750 words) Term Paper

Cyber Security and Information Security

Textbook: Management of Information security by Whitman and Mattord Chapter 2 P.... Another interesting thing to consider is that there may be a risk from collaboration between insiders and outsiders, which could pose a significant risk to information security.... The change may also be due to the fact that many corporations are aware of the risk from outside the company, and thus information security has been tightened up in the last decade making it very difficult for outsiders to attack without relevant passwords or passkeys....
4 Pages (1000 words) Assignment

Chinese Versus American National Cyber Security

This paper ''Chinese Versus American National cyber security'' tells that Cybercrime is a reality that has hit the information networks in a world driven by computer and internet technology.... Countries are engaging national cyber security policies to ensure information security as data traverses the information networks.... The purpose of this study is to compare the effectiveness of the national cyber security policies that have been applied in China and America and to provide viable solutions to the weaknesses in these policies....
11 Pages (2750 words) Research Proposal

Cyber Security, Cyber Crime and Cyber Forensic

The author of this assignment "cyber security, Cyber Crime and Cyber Forensic" comments on the role of federal agencies in fighting digital crime.... This initiative is likely to be a costly one but since it is bound to ripe digital security then it is a priceless initiative worth taking (Santanam&Sethumadhavan, 2011).... National security Agency – this section of the organization is charged with the mandate to protect United States' information system from unauthorized access....
2 Pages (500 words) Assignment

Private Network and Cyber Security

This paper under the headline "Private Network and cyber security" focuses on the fact that to prevent an external IP address from somebody pretending to be an internal user, it will be necessary that packet rules with combinations of filters are used.... Companies are also keen to release any of the important information regarded as business security and such information is normally protected with passwords and cookies which prevent hackers from obtaining them (Mason pg 7)....
1 Pages (250 words) Assignment

Sample Cyber Security Profile

This paper discusses the many facets of protecting these vulnerabilities against large-scale attacks… One of the most crucial elements to understanding within the realm of security is the User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element According to many publications, NIST is very proactive in this element as one of the main is attacks on User Domain....
4 Pages (1000 words) Essay

Cyber Security and Startups

The attack targets… The authors indicate that the charges requested normally range between $100 and $300, but there are fears it could be increased in the future to extort cyber security and Start-ups What is a DDoS attack?... The attack targets significant resources used by business organizations, security firms or schools by making it a challenge to access the information.... They do not also install security measures to protect against such attacks, which make them vulnerable to pay the ransom demanded....
1 Pages (250 words) Case Study

Cyber Security in Business Organizations

With the incorporation of information technology into organizational operations, corporations have become vulnerable to a plethora of information security risks.... Johnson and Goetz (2007) describe security risk management as a balance between “maintaining security” and keeping the Information security failures tip the balance and expose organizations to the aforementioned threats.... Organizations are challenged by the trend to ‘go global' which implies that security programs should encompass the entire global market of a firm....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us