Describe an intrusion prevention system does


Assignment:

Assignment Description

Incorporate at least 5 resources to show that you have conducted ample research to support a 2,000 word business plan. This assignment is not an essay but rather, a business plan to identify key considerations of prevention and detection systems that can mitigate or eliminate cyber threats from impacting organizational ICT systems.

Assignment Details

Intrusion prevention systems (IPS) and intrusion detection systems (IDS) are key components to a layered security strategy. Understanding these technologies and value is critical before constructing an ICT system security program.

For this assignment, research the benefits or detractors of deploying intrusion prevention and intrusion detection systems, and create a business plan explaining the benefits and detractors of these technologies. Areas and topics that may be considered are as follows:

• Describe what an intrusion prevention system (IPS) does.

• Describe what an intrusion detection system (IDS) does.

• Discuss how next-generation IPS and IDS technologies have evolved over the last decade. Or, have they not evolved?

• How are both IPS and IDS utilized in a layered security typology?

• What are the cost considerations of deploying IPS and IDS systems?

• Is there maintenance required for these systems?

• Will next-generation cyber technology replace the current value of IPS and IDS technology?

• Are these a worthwhile investment?

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

Reading Materials

• This article discusses defense in-depth as a strategy to preserve ICT systems. Click here to read the article.

• This article conveys recommendations for more secure IDS/IPS that aim to increase not only the security of the system itself, but the company's security posture as a whole. Click on this link to view the article.

• This article discusses the corporate responsibility of audits and controls. Click on this link to learn more.

• Forty seven data security experts compare the risks of insider threats versus outsider threats in this in-depth discussion of data threats. Click here to read the article.

• Expert contributor Karen Scarfone examines the best intrusion prevention systems to help you determine which IPS products may be best for your organization. Click on this link to view the article.

• The spirit of cooperation seems to be taking hold, as demonstrated by the growing number of thriving services and organizations whose sole purpose is to analyze specific threats against specific communities. Click here to learn more about threat intelligence sharing.

Assignment Objectives

• Evaluate cybersecurity best practices within business organizations

• Evaluate the purpose, importance, and primary content of Security Policies, Security Standards, Security Procedures, and Security Awareness within an organization

• Examine cybersecurity from a technical and managerial perspective

• Outline the application of techniques for identifying, detecting, and defending against cybersecurity threats within a business environment

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Describe an intrusion prevention system does
Reference No:- TGS02993955

Now Priced at $50 (50% Discount)

Recommended (93%)

Rated (4.5/5)