+1835 731 5494 Email: instantessays65@gmail.com

INFA/620 INFA620 INFA 620 Session 10 Discussion


INFA 620 Session 10 Discussion Deploying Intrusion Detection Systems After antivirus software and firewalls an IDS is considered the best way to detect a security breach. However, successfully deploying an IDS is one of the biggest challenges for a security administrator. The purpose of this session is to discuss real-life deployment considerations. Read through Chapter 11 Stallings textbook and Session 10 Notes and learn about intruders and IDSs. ________________________________________ Assignment: Give an answer to the following topics: • As a network administrator you are asked to improve your network security by adding an IDS. What type of IDS should you use? (Hint: In supporting your case, you may take into account your network topology, operating system platforms, budget, needs, experience, etc.) • Before you buy an IDS, you have to be sure you have enough resources to maintain it. What kind of problems you have to face? • You want to deploy your first IDS. What are the steps you may consider to a successful IDS deployment?


There are no reviews yet.

Be the first to review “INFA/620 INFA620 INFA 620 Session 10 Discussion”

Your email address will not be published. Required fields are marked *