Tuesday, October 22, 2019
Cybersecurity Example
Cybersecurity Example Cybersecurity ââ¬â Coursework Example Cyber security Grade (8th, Jan. Cyber security Response to First question and answer In my opinion, the argument presented in response to the failure of firewall to prevent intrusion is plausible; since firewall cannot protect a whole network from intrusion by all forms of intrusion. While it can help in preventing the intrusion of local network by internet attacks, it might not be able to prevent internal intrusion. Therefore, the dependency on firewall alone is not sufficient security measure, since it leaves the internal intrusion uncovered, which is another intrusion threat. Additionally, I agree that D&A Company ought to have applied an Intrusion Prevention System, since it would have helped to detect any anomaly or alteration in the performance of the companyââ¬â¢s network, and thus help to detect the intrusion by Billy, since his activities on the network would have been detected as an anomaly. Response to Second question and answerIn concurring with the response to this qu estion, Honey pots are used as a side trap for tracking hackers and other intruders into a network system. However, depending on how honey pots are used, they might end-up being discovered by the intruders as only traps, more so if they are not developed in a manner that make them appear like genuine networks. Therefore, the efficiency and effectiveness of honey ports depend on the ability to develop them and locate them at the most appropriate locations in the networks, where the hackers and intruders cannot easily discover them as traps. Thus, in agreement with the answer to this question, adequate resources, manpower as well as proper planning and timing on the honey pots placement is essential, to make them effective network security tools.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.