In your own words (NOT copy and pasting plagiarism), Design a thoroughly detaile
ID: 3757049 • Letter: I
Question
In your own words (NOT copy and pasting plagiarism),
Design a thoroughly detailed implementation for
Implement IDS/IPS solution &
Implement VPN for Remote Users
Thank You!
Requirements for the person that will be answering the above question.
* Type out responses in Your Own Words!
* Do not write on paper and send a photo.
* NO plagiarism/ NO copy and pasting from outside sources without properly citing your sources.
** FAILURE to adhere to the stated requirements will result in thumbs down and will be reported to Chegg administration. **
Explanation / Answer
Answer)
IDS otherwise called as Intrusion Detection System and IPS otherwise called as Intrusion Prevention System are both meant for enhancing the security level of the network monitoring traffic and monitoring and scanning the packets.
Some of the implementation criteria are as follows:
IPS should be multifunctional and handles the traffic path whereas in IDS the device monitors the network traffic.
AET Protection is used by the NSS Labs as well as other organizations for testing the security vendors.
Event Correlation does help to reduce the false positive events as well as provide the accurate protection for the network services as well as intranet users.
An IPS enhancement is the Web filtering that provides the multiple benefits like the increased security by stopping virus attacks, malware etc.
SSL inspection would help to ensure that no attacks are there
IPS even helps to protect against the illegal input as well as traffic flood DoS attack.
Integration with the firewall and making the IPV ready are crucial parts of IPS to ensure stateful access.
Implementation of VPN would comprise of hardware and software configuration along with the network configuration for a business as per the organization needs. A VPN also would include the firewall capabilities, web server capabilities, and variety of applications like most Point of Sale (POS) devices like the card swipers for any debit and credit card transactions. It even provides security across the private network as mentioned above.
Hit like if you find the answer useful. :)
Hope this answer helps. Thanks