How a Network Administrator can Tighten the Network Security by Implementing Layer of Defence i.e. Intrusion Detection System (IDS)?

$10.00

SKU: Repo933923 Category:
  • Different Levels of Network Security
  • Working Process of IDS
  • Difference between Firewall and IDS

 

 

Learning outcomes to be examined in this assessment

• Demonstrate understanding the importance of network security.

• Demonstrate understanding the importance of security measures for any network.

• Employ risks assessment methods to identify high-risk areas of the network, which requires surveillance by the network administrator to protect the network from any attack.

 

Assignment Task:

To write a  report to answer the following question;

How a network administrator can tighten the network security by implementing layer of defence i.e. Intrusion detection system (IDS)?

 

Your report should discuss how IDS captures real time network traffic, then analyses this traffic for any possible intrusion and takes preventive measure to stop the intrusion and also intimate the network administrator via alert.

 

Network security is constantly under attack from both external and internal sources. The key security goals, confidentiality, Integrity and availability of the system could only be achieved through proper security implementation in a network and by accessing the critical performance parameters of a network.

 

The corporate sector is heavily dependent on computers for their business activities and cannot afford any disruption in their operations. To maintain smooth business operations of the organizations and protection of their confidential data, it has become necessary for the network administrator to keep an eye on network activities.

 

We cannot achieve 100% network security but having effective controls in place can reduce the risks of network being compromised.

 

Deliverables

How a network administrator can tighten the network security by implementing layer of defence i.e. Intrusion detection system (IDS).

 

In this report should discuss how IDS captures real time network traffic, then analyses this traffic for any possible intrusion and takes preventive measure to stop the intrusion and also intimate the network administrator via alert.

 

Pass: In order to achieve a pass, your report should analyse and evaluate issues of network architectures to enhance the security of the computing and network environments. Your report should be clearly structured and make use of appropriate references.

 

2.2: In order to achieve a 2:2 grade, your report should highlight how IDS captures real time network traffic, and indicate an understanding of how to analyse traffic for any possible intrusion. Your report should be clearly structured and make use of a range of appropriate references.

 

2.1: In order to achieve a 2:1 grade, your report should discuss how IDS captures real time network traffic, then analyses this traffic for any possible intrusion and takes preventive measure to stop the intrusion and also intimate the network administrator via alert. Your report should be clearly structured and make use of a range of appropriate references.

 

First: In order to achieve a First class mark, your report should confidently, discuss and critique how a network administrator can employ risks assessment methods to identify high-risk areas of the network and tighten the network security by implementing layers of defence. Your report should be clearly structured, written and make use of a range of appropriate references, which you approach critically.

 

Findings and Analysis

• This is the substance of your report. The structure will vary depending on the material being presented. Headings and sub-headings should be used to indicate clearly the different sections.

• The following headings may help to add structure: situation; problem; solution; evaluation. It is not sufficient simply to describe a situation. Analysis and a critical approach are essential.

• Charts, diagrams and tables can be used to reinforce your arguments, although it may be better to include the more complex ones as an appendix.

 

Conclusions

These draw out the implications of your findings. Deductions are based on the facts described in the findings and analysis. Remember not to include any new material here.

 

Recommendations

Indicate what you think should be done to improve or develop the situation in specific ways. Highlight the steps for action.
 
 

Writing your homework and assignments all on your own is a difficult task. So, Assignments4u has made it easy for students by helping them in writing their assignments. Assignments4u will assist you in completing your tasks, and you can approach us with all your assignment, homework, and essay writing requirements.

We have over 4350+ experienced writers working as experts in different streams of study. Get all your academic doubts clarified and take pride in learning subjects like history, math’s or law. Our assignment help and essay help is available in countries like USA, Australia, New Zealand, Singapore and many more. Get accounting assignment help, corporate nursing assignment help, marketing assignment help or else statistics assignment help in exchange for a nominal price.

Reviews

There are no reviews yet.

Be the first to review “How a Network Administrator can Tighten the Network Security by Implementing Layer of Defence i.e. Intrusion Detection System (IDS)?”

Your email address will not be published. Required fields are marked *

Sorry no more offers available

When assignments gets tough, get tougher

Want a fresh solution like this one? 
We are available 24/7
ORDER NOW
Get CallBack