How a Network Administrator can Tighten the Network Security by Implementing Layer of Defence i.e. Intrusion Detection System (IDS)?

$10.00

  • Different Levels of Network Security
  • Working Process of IDS
  • Difference between Firewall and IDS

 

 

SKU: Repo933923

Learning outcomes to be examined in this assessment

• Demonstrate understanding the importance of network security.

• Demonstrate understanding the importance of security measures for any network.

• Employ risks assessment methods to identify high-risk areas of the network, which requires surveillance by the network administrator to protect the network from any attack.

 

Assignment Task:

To write a  report to answer the following question;

How a network administrator can tighten the network security by implementing layer of defence i.e. Intrusion detection system (IDS)?

 

Your report should discuss how IDS captures real time network traffic, then analyses this traffic for any possible intrusion and takes preventive measure to stop the intrusion and also intimate the network administrator via alert.

 

Network security is constantly under attack from both external and internal sources. The key security goals, confidentiality, Integrity and availability of the system could only be achieved through proper security implementation in a network and by accessing the critical performance parameters of a network.

 

The corporate sector is heavily dependent on computers for their business activities and cannot afford any disruption in their operations. To maintain smooth business operations of the organizations and protection of their confidential data, it has become necessary for the network administrator to keep an eye on network activities.

 

We cannot achieve 100% network security but having effective controls in place can reduce the risks of network being compromised.

 

Deliverables

How a network administrator can tighten the network security by implementing layer of defence i.e. Intrusion detection system (IDS).

 

In this report should discuss how IDS captures real time network traffic, then analyses this traffic for any possible intrusion and takes preventive measure to stop the intrusion and also intimate the network administrator via alert.

 

Pass: In order to achieve a pass, your report should analyse and evaluate issues of network architectures to enhance the security of the computing and network environments. Your report should be clearly structured and make use of appropriate references.

 

2.2: In order to achieve a 2:2 grade, your report should highlight how IDS captures real time network traffic, and indicate an understanding of how to analyse traffic for any possible intrusion. Your report should be clearly structured and make use of a range of appropriate references.

 

2.1: In order to achieve a 2:1 grade, your report should discuss how IDS captures real time network traffic, then analyses this traffic for any possible intrusion and takes preventive measure to stop the intrusion and also intimate the network administrator via alert. Your report should be clearly structured and make use of a range of appropriate references.

 

First: In order to achieve a First class mark, your report should confidently, discuss and critique how a network administrator can employ risks assessment methods to identify high-risk areas of the network and tighten the network security by implementing layers of defence. Your report should be clearly structured, written and make use of a range of appropriate references, which you approach critically.

 

Findings and Analysis

• This is the substance of your report. The structure will vary depending on the material being presented. Headings and sub-headings should be used to indicate clearly the different sections.

• The following headings may help to add structure: situation; problem; solution; evaluation. It is not sufficient simply to describe a situation. Analysis and a critical approach are essential.

• Charts, diagrams and tables can be used to reinforce your arguments, although it may be better to include the more complex ones as an appendix.

 

Conclusions

These draw out the implications of your findings. Deductions are based on the facts described in the findings and analysis. Remember not to include any new material here.

 

Recommendations

Indicate what you think should be done to improve or develop the situation in specific ways. Highlight the steps for action.

Reviews

There are no reviews yet.

Be the first to review “How a Network Administrator can Tighten the Network Security by Implementing Layer of Defence i.e. Intrusion Detection System (IDS)?”

Your email address will not be published. Required fields are marked *

Sorry no more offers available