Question: Today's network architecture is complex and is faced with a threat environment that is always changing and attackers that are always trying to find and

Today's network architecture is complex and is faced with a threat environment that is always changing and attackers that are always trying to find and exploit vulnerabilities. These vulnerabilities can exist in a broad number of areas, including devices, data, applications, users and locations.

(a) Describe statistical anomaly detection intrusion and rule based detection. (15 marks)

(b) Illustrate the network structure to demonstrate the role of packet filters in a firewall implemented on a network. (6 marks)

(c) Explain any TWO (2) deficiencies of a firewall. (4 marks)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!