Asia Pacific University is a technological based university located at Technology Park Malaysia (TPM), and is...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Asia Pacific University is a technological based university located at Technology Park Malaysia (TPM), and is amongst Malaysia's Premier Private Universities, offering various undergraduate and postgraduate programmes in different disciplines. The senior management of APU has directed the ICT department to address security concerns that are popping up in recent years by evaluating the potential Information and Network security threats. Also, the senior management would like to deploy additional access and security controls to prevent unauthorized activity from occurring in the campus network. So, as the Head of ICT department, you need to start thinking of the expert way in addressing the security concerns raised and finding ways to deploy additional access and security controls as directed by the senior management. Before you successfully address the concerns raised by senior management, the following questions are to be answered as part of the research work to support the plan: (a) Your team has finally deployed the firewall with IDS (Intrusion Detection System) for APU and the senior management of APU appreciated your team for the successful deployment. What are the FOUR (4) security boundary parameters you have considered for building this successful automated and procedural configuration in the firewall? Discuss in detail each of them. (b) You have also discovered that there is a need to implement Intrusion Prevention System (IPS) for the internal security purpose. Discuss the roles of IPS with appropriate diagram. Your points will used for decision making for implementation process of IPS with Snort. Asia Pacific University is a technological based university located at Technology Park Malaysia (TPM), and is amongst Malaysia's Premier Private Universities, offering various undergraduate and postgraduate programmes in different disciplines. The senior management of APU has directed the ICT department to address security concerns that are popping up in recent years by evaluating the potential Information and Network security threats. Also, the senior management would like to deploy additional access and security controls to prevent unauthorized activity from occurring in the campus network. So, as the Head of ICT department, you need to start thinking of the expert way in addressing the security concerns raised and finding ways to deploy additional access and security controls as directed by the senior management. Before you successfully address the concerns raised by senior management, the following questions are to be answered as part of the research work to support the plan: (a) Your team has finally deployed the firewall with IDS (Intrusion Detection System) for APU and the senior management of APU appreciated your team for the successful deployment. What are the FOUR (4) security boundary parameters you have considered for building this successful automated and procedural configuration in the firewall? Discuss in detail each of them. (b) You have also discovered that there is a need to implement Intrusion Prevention System (IPS) for the internal security purpose. Discuss the roles of IPS with appropriate diagram. Your points will used for decision making for implementation process of IPS with Snort.
Expert Answer:
Answer rating: 100% (QA)
a IT security is about protecting things that are of value to an organization That generally includes people property and data other words the organizations assets Security controls exist to lessen or ... View the full answer
Related Book For
Essentials Of Modern Business Statistics With Microsoft Excel
ISBN: 9780357131626
8th Edition
Authors: David R. Anderson, Dennis J. Sweeney, Thomas A. Williams, Jeffrey D. Camm, James J. Cochran
Posted Date:
Students also viewed these computer network questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
A system consists of n identical components each of which will, independently, function with probability p. The system will be able to operate effectively if at least half of the components function....
-
Repeat Prob. 1419 using helical gears each with a 20 normal pitch angle and a helix angle of 30 and a normal diametral pitch of 6 teeth/in.
-
Expand 32/(x + 2) 3 in ascending powers of x, up to and including the term in x 3 .
-
How is pollen transferred from one plant to another in conifers? In flowering plants?
-
Listed below are several transactions that took place during the second two years of operations for RPG Consulting. In addition, you learn that the company incurred advertising costs of $25,000 in...
-
How many times does the following loop print fred? for (int i = 0; i < 6; ++i) } for (int j=1; j
-
Explain why correctly owning assets is important to the personal finances of people, especially couples.
-
Explaining why Supermarkets such as Woolworth should choose Millennials to be their Target Market instead of Generation X and others?
-
Several arguments in defense of Carl Construction against Mr. House's nonpayment and future claims. 17 Fla. Jur 2d Damages 22 states: "For the breach of a construction contract, the contracting...
-
Respond to your classmate. . If you have software or something running on the operating system, those logs can be found in other locations. These logs are generally stored in plain text and things...
-
How would you put this in Statement of Cash Flows Reconciliation to Net Income, Statement of Financial Position, and Statement of Operations? 1/1/2022 Debit Credit Cash $ 950,000.00 Common Stock $...
-
Replace the force system with a single resultant force. Let F = [F] KN. e) Determine the point y on the y-axis through which the resultant must pass. 8 kN-m 3 m 5 m F 13/12 4 m A 4 m P 3 m 4 kN 60
-
A capacitor has parallel plates that have an area of 1.06 cm and are 1.04 mm apart. There is a vacuum between the plates, and the electric field magnitude is 1.09 x 106 N/C. (a) Find the potential...
-
In the lodging segment of the hospitality industry, many hoteliers allow front desk and night audit staff to use their own judgment when deciding whether to reduce room rates to ensure room sales to...
-
Consider the setup in Problem 16. Show that the relative speed of the ball and the point of contact on the stick is the same before and immediately after the collision. (This result is analogous to...
-
In 2018, the Pew Internet & American Life Project asked 743 teens aged 13 to 17 several questions about their attitudes toward social media. The results showed that 602 say social media makes them...
-
Skechers U.S.A., Inc., is a performance footwear company headquartered in Manhattan Beach, California. The sales revenue for Skechers over a four-year period are as follows: a. Are these...
-
The following data show the number of rental cars in service for three rental car companies: Hertz, Avis, and Dollar, over a four-year period. a. Construct a time series graph for the years 1 to 4...
-
What are non-banking financial intermediaries? List the different types and briefly explain their role in connecting savers with borrowers in the financial system.
-
Name and briefly explain the three key components of a modern financial system.
-
Briefly explain the process of asset securitization in the financial system.
Study smarter with the SolutionInn App