Intrusion Detection Systems
Learning Objective: Identify and describe the types of intrusion detection systems and the two strategies on which they are based.
Assignment Requirements
Q1. Review articles that describe intrusion detection systems. (This does not include Wikipedia or vendor’s literature.)
- Write an introduction that describes an intrusion detection systems (IDS) for someone that is not a security professional.
- Describe and contrast two IDS. Make sure you include advantages, disadvantages, life-cycle cost (which includes updates).
- Write a conclusion that contains your recommendation of which IDS to use for a small business.
Submission Requirements
- Format: Microsoft Word
- Font: Arial, 12-Point, Double- Space
- Citation Style: APA
- Length: 2– 3 pages (plus a cover sheet)
Encryption of Data at Rest
Learning Objective: Discuss the encryption process of data at rest.
Assignment Requirements
Q2. Write a paper that discusses encryption and how it is used to protect data at rest (i.e., storage).
- Introduce the concept of encryption.
- Describe the THREE states of data in an information processing system.
- Discuss the advantages and disadvantages of encrypting data at rest.
- Why should IT professionals be concerned with encrypting data?
- Conclude with your recommendation of an encryption policy to your organization.
Submission Requirements
- Format: Microsoft Word
- Font: Arial, 12-Point, Double- Space
- Citation Style: APA
- Length: 3 – 4 pages (plus a cover sheet)