Securing your network and infrastructure requires a mix of capabilities and techniques. In the past, quite a bit of effort was focused on the prevention of an attack, but what about those times when a new or unanticipated attack gets through your defenses? Sure, you can prevent an attack by using firewalls, policies, and other technologies, but there are other things that can help. That’s where detection comes into play and where devices and technologies such as IDSs and honeypots can assist you. Consider the following questions and respond to at least three from the list:
- Why are firewalls useful?
- Why would honeypots attract attackers?
- Why are IDSs effective in minimizing attacks?
- Why is it useful to incorporate an IDS into a security plan along with a firewall?
- Why would security professionals use a honeypot?
In preparing your response, cite at least one source from professional or academic literature, such as articles from peer-reviewed journals and relevant textbooks. For this course, the use of Wikipedia is not considered an academic or professional reference. You should also be sure to proof-read and spell-check your responses. All sources should be formatted per Saudi Electronic University academic writing standards and APA style guidelines.
Be sure to support your statements with logic and argument, citing any sources referenced. Post your initial response early and check back often to continue the discussion. Be sure to respond to at least two of your peers’ posts as well.


0 comments