Wednesday, December 18, 2019

Network Architecture Essay - 734 Words

Running Head: NETWORK ARCHITECTURE 1 NETWORK ARCHITECTURE 5 Network Architecture Name Course Tutor Date BULLET QUESTIONS Q1: There might be no alerts when running snort IDS because if there is improper configuration Specific conditions are required for alerts to appear. These specific conditions have to be met within the software in question. Modification of detection settings may lead to mistakenly making these changes to the packet sniffing use which might require enabling for the alerts to work (Kohno, Ferguson, Schneier, 2010). Q2: When one visits a few websites, many alerts pop up. An Intrusion Detection System conducts monitoring of any suspicious patters as well as outbound and inbound activities through packet†¦show more content†¦Q6: One type of rule-set that could be added to a high level security network is the exploit rules’ type. It helps with the detection of direct exploits and indication of an occurrence of an exploit attempt. At this point, a network administrator is able to detect any attacks to the system thus leading to the vulnerability being patched. Q7: A person with malicious intent who has access to the read/write ability on the network can use the information to his advantage through having the ability to make adjustments like a network administrator would, with changes being made on the rule-set so that they use it for the sake of launching attacks to the network, with even adjustments being made to have his identity instead or even disabling the IDS. Q8: The advantages of an intrusion prevention system include configuration of the sensor to stop a trigger packet for a packet drop performance and the use of stream normalization technique is allowed. The disadvantages are the security policy must be well thought out for response actions, network performance may be affected by overload of sensor capabilities and network traffic may be affected by sensor errors (Shimeall, Spring, 2014). Q9: Several factors may be considered in the case of a denial of service attack. With all traffic allowed through, instability and insecurity of network may occur leading to resource inaccessibility.Show MoreRelatedThe Link Between The Internet And London Underground1674 Words   |  7 PagesIn this essay I will analyze how and why the Internet distinctively differs from other ordinary kinds of networks; specifically, I will compare it to the London Underground system (reference to the network analysis of the 2005 London underground attack, Ferenc 2008. Therefore, in this essay I will analyze and discuss the extent to which the Internet is widely different to other networks; I will support my point using some leading scholar’s theories and experimental results. Before analyzing andRead MoreHappiness is a Biopsychosocial Phenomenon Essay962 Words   |  4 Pagesgenetic make-up? The following essay will explore subjective well-being in general, as this is considered to be synonymous with happiness. An explanation will be given of both the model of architecture of sustainable happiness, and a clear definition of the biopsychosocial model. Throughout the essay, examples from the SKD228 module will be given as evidence of support with possible links to biological factors. The essay will conclude on whether or not the architecture of sustainable happiness is compatibleRead MoreHow Technology Has Continuously Improved Computer Hardware Devices1432 Words   |  6 Pagesbeen a necessity for transmitting data securely and in today’s society personal containment (Crayton Culp, n.d.). Over the next five decades inventors, of all nationalities, have worked to improve encryption hardware devices from the internal architecture, removable storag es, networking devices, and the overall networking security module. Encryption has different meanings depending on what you context you are using it in, but for the cyber context is means to â€Å"convert electronic data into anotherRead MoreSoftware System Architecture Essay1730 Words   |  7 PagesSoftware System Architecture Essay 03/04/2008 Once a business need is established, software system architecture is formulated to meet this business need. To properly formulate the software system architecture we must employ proven strategies, such as diagrams that illustrate the parts of the system and how they work together. These subsystems collaborate intelligently to support the functionality of the whole system. Project managers must be aware of the system architecture involved andRead MoreAdvantages and Disadvantages of Service Oriented Architecture (SOA)1379 Words   |  6 PagesSOA ASSIGNMENT In this essay I will be discussing Service Oriented Architecture. As part of that I will write about the terms Web Service, Service Oriented Architecture and SOAP. I will list some advantages and disadvantages of SOA as well as the technology involved in using SOA and the standard syntax and operation employed in such a system. I will close this essay by writing about a company that could take advantage of the Service Oriented Architecture. Web Services The World Wide Web ConsortiumRead MoreNavys Enterprise Resource Planning System739 Words   |  3 Pagesorganizations to the line-of-business users, away from IT, while also drastically changing the architecture and platforms of ERP systems (Markus, Petrie, Axline, 2000). The intent of this essay is to define how ERP will develop over the next five years, also defining what ERPs development will mean for business and organizational models of public-service contractor companies and the U.S. Government. The essay will continue with prescriptive guidance of whether public-service contractor companies needRead MoreCommunication Protocols And Functions Of Seven Layers Of The Osi Model Essay980 Words   |  4 Pagesreliability, simplicity, programmers choose these protocols. In this essay, I am going to address about the networks and commonly used protocols, functions of seven layers of the OSI model, TCP/IP protocol, and protocols used in wireless communication. Technologies related to internetworking is growing rapidly day by day. â€Å"A network is a group of connected, communicating devices such as computers and printers.† [1] When two or more networks exists and communicate with each other, it is known as an internetRead MoreSocial Structure in the Colosseum1229 Words   |  5 Pagesin the history of the world. From the basic rules of how the Roman Empire is set up to the infrastructures in the city, the strict hierarchy of Roman social structure can be reflected clearly all over the whole ancient Rome. In fact that â€Å"public architecture presents people with the official view of a society and provides the background against which its individual markers live their lives.†1 With the great desire of Roman for entertainment and their special taste for blood, the amphitheatre is consideredRead MoreThe Role Of Successful Cios In Organizations761 Words   |  4 PagesChief Information Officer (CIO) has grown from only a serv ice provider to an executive level position. CIOs normally report directly to the Chief Executive Officer (CEO) and their managerial expertise effects the entire organization (Chun, 2009). This essay will evaluate how CIOs can ensure that IT in their organization will support value creation and strategic advantage over the next five years. To achieve this, a critical action will be formulated from each category of the taxonomy each organizationRead MoreAndroid1342 Words   |  6 PagesBluetooth, edge, 3G , WiFi support. * Camera GPS, accelerometer support. * GSM telephony support. * Integrated browser based on the open source webkit engine * Media support for common audio video, still image formats. Architecture Architecture Diagram Android architecture has four layers: 1. Application Layer : Android is one of skillful and modifiable OS because of its many applications.Top 25 applications in the list below * Goggle voice * Advanced task killer * Drop box * Evernote

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.