Question: Today's network architecture is complex and is faced with a threat environment that is always changing and attackers that are always trying to find and
Today's network architecture is complex and is faced with a threat environment that is always changing and attackers that are always trying to find and exploit vulnerabilities. These vulnerabilities can exist in a broad number of areas, including devices, data, applications, users and locations.
(a) Describe statistical anomaly detection intrusion and rule based detection. (15 marks)
(b) Illustrate the network structure to demonstrate the role of packet filters in a firewall implemented on a network. (6 marks)
(c) Explain any TWO (2) deficiencies of a firewall. (4 marks)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
