Purpose
Interpreting the signatures of normal and abnormal network traffic can help prevent network intrusions. In this assessment, you will examine the characteristics of a network intrusion.
Assessment Instructions
Part 1: Concepts From Module Reading
Answer and provide a brief explanation (3050 words) and include at minimum of 1 scholarly source cited in APA format for each of the following five questions.
- A ____________________ is a generic type of scan in which an attacker attempts to locate ports opened by a Trojan by scanning ports 065,535.
- True or False: An attacker might choose to limit the speed at which they attack a network in order to avoid detection.
- __________, which are TCP packets with no flags set, can be sent by an attacker to attempt to crash a server.
- The ____________________ is used to set the largest sized packet that can be transmitted on a network. Larger packets than this number will be fragmented.
- IP address
- Maximum Transmission Unit (MTU)
- IP protocol number
- What type of attack might the Nemesis tool be used for?
- Packet injection
- Path obfuscation
- CGI script exploitation
Part 2: Signatures and Actions
- Signatures fall into one of the following two categories: Atomic signatures and stateful signatures. Describe each and include at minimum of 1 scholarly source cited in APA format. (100200 words each)
- There are three types of signature triggers. Describe each and include at minimum of 1 scholarly source cited in APA format. (100200 words each)
Part 3: Network Traffic Signatures
- Distinguish normal traffic signatures from abnormal traffic signatures. Include at minimum of 1 scholarly source cited in APA format (Minimum 300 words total)
Part 4: Detection and Prevention Capabilities
- You want to deploy a wireless intrusion detection system. What tool would you use and why? (Minimum 300 words total) Include at minimum of 1 scholarly source cited in APA format
- Most intrusion detection and prevention systems support multiple detection capabilities. Distinguish each of the following: Thresholds, blacklists, whitelists, and alert settings. (Minimum 300 words total) Include at minimum of 1 scholarly source cited in APA format

Leave a Reply
You must be logged in to post a comment.