IDS Analysis Paper Overview The implementation of intrusion detection system (ID

IDS Analysis Paper
Overview
The implementation of intrusion detection system (IDS) technologies comes in many different forms. Staying current with industry literature that discusses strategies on mitigation and remediation of different malware will increase your knowledge of what steps to take to help prevent succumbing to an attack. As cybersecurity is a field that can change on a daily basis, you will not stop learning and growing even after you complete your degree program. Evolving with the field and staying current is a critical aspect of being successful and excelling in this field.
It is important to recognize that IDS is not a one-size-fits-all tool. An IDS can be configured in three different ways: it can test for anomalies, be heuristic-based, or be a hybrid of the two. Configuring the IDS to meet specific business needs will reduce the amount of time an analyst needs to explore log files and other information generated by the IDS. The individual should be left to handle the alerts generated by the properly configured system.
When putting any controls in place to protect a system, you must always keep confidentiality, integrity, and availability in mind, using your proactive mindset, to develop the best protection for the system. It is important to examine possible indicators of an attack and how other aspects of a system can be affected. Malware is a great example of an attack that affects all tenets of the CIA triad.
For this project, you will be creating an IDS Analysis Paper that examines the interaction of the security objectives of the CIA triad and the configuration of an IDS, and contains practical application of IDSes in a scenario-based application of your choosing.
The project incorporates one stepping stone, which will be submitted in Module Four. The project will be submitted in Module Six.
In this assignment, you will demonstrate your mastery of the following competency:
Implement an intrusion detection system (IDS)
Prompt
You must address the critical elements listed below. The codes shown in brackets indicate the competency to which each critical element is aligned.
IDS and Security Objectives—Critical Thinking QuestionsWhat component of an IDS is best prepared to help with the loss of confidentiality?
What are the indicators of malware that could be detected by an IDS that may result in the loss of integrity?
How can an IDS be used to detect the loss of availability?
Configuring an IDS—Scenario Based QuestionsCreate a brief fictitious scenario of a company that resides within two buildings. Include a short profile of its data assets, its industry, and its size. For example, Southern New Hampshire High School has an administration building and an academic building. The data assets it protects are student records and employee records. The industry is education, and there are 500 students and employees.
Identify two components that you would implement to provide the best IDS protection for your fictitious company. Justify your response.
What to Submit
Your submission should be 2–4 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Project Two Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Critical Thinking Questions: ConfidentialityMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains what component of an IDS is best prepared to help with the loss of confidentialityAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Critical Thinking Questions: IntegrityMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes indicators of malware that could be detected by an IDS that may result in the loss of integrityAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Critical Thinking Questions: AvailabilityMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerDescribes how an IDS can be used to detect the loss of availabilityAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Scenario Based Questions: Fictitious ScenarioMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerCreates a brief, fictitious scenario of a company that resides in two buildings, including a short profile of its data assets, its industry, and its sizeAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Scenario Based Questions: Two ComponentsMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerIdentifies two components to configure to provide the best IDS protection for the fictitious company and justifies responseAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant18
Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, or organizationSubmission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas10
Total:100%

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount