RESPOND TO BOTH OF THE PEER POSTS BELOW IN ONE PARAGRAPH EACH ANSWERING THE FOLLOWING QUESTION(S)
QUESTION –
In response to your peers, select the methodology (anomaly, signature, stateful protocol analysis, or hybrid) that best aligns with the chosen parameters and situation. Justify your response. Then select an additional parameter that would either support the methodology selection or represent an area of concern for that methodology.
____________________________________________________________________
PEER POST # 1
Hi, the two parameters I’d choose are Performance and High accuracy rate in the E-commerce industry, most vendors would be through website hosts or other requiring their own security team though some might host their own server this setup would be most simple and efficient on self-hosted owner as well hosted service owner. When setting up a business needing a secure connection while being available to all clients at same stability for large traffic would require Performance the need keep up on new users and information and making sure none are illegitimate or dangerous as well sending the correct information when connecting, High accuracy rate is helpful to detecting and finding possible threats while not being able to protect itself to unknown or first day vulnerabilities or problems it will be helpful to go low on false positives. With performance making sure system stays stable and efficient on checking of signatures. While this set up does provide a parameter of mostly medium and high on all parts but shines with signature, stateful protocol, hybrid while Anomaly would be medium to both since they don’t have much effect will be a weak point of the IDPS since most would try to do denial of service, having performance will help against denial of service attacks since low amount of resources it will take to analyze and scan the inbound and outbound traffic against threats and see malicious process as well high accuracy on recognizing a denial of service attack which are common for online businesses to most deal with.
PEER POST # 2
The two evaluation criteria I chose are Easy to Use and Scalability. In an environment with a lot of new users or contractors that come by, it’s very important to prioritize the evaluation criteria of easy to use. Think about an organization that has a very large building that it resides in. Without labeled rooms, somebody unfamiliar with the layout could end up all over the place. They would likely be passing between a lot of different rooms, and that could easily include ones that they should not have access to. This same situation can be applied to a website where it might not be totally clear which text box a user needs to put personal information into. In these cases, a large percentage of problems could be avoided entirely by investing in making the resource easier to use. Think about what might happen if one of those text boxes sends their information to an insecure location! In terms of Scalability, it’s important that an organization has the ability to grow. With more employees and resources comes more problems, and that includes network security. An example of scalability in action could be a system of setting permissions. In a smaller company, it can be pretty easy to do manually. The larger the organization gets, however, the more difficult it becomes. Creating instead, a system that allows for easy management of these permissions can really help prevent a situation such as a rogue employee (or employee account) having the ability to do a lot of damage.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
