Security Controls Testing

Description

Choose one of the following discussion topics and create a post with your response:

Watch This
Security Controls Testing: https://www.youtube.com/watch?v=2VGOz5knADk
RMF Step-4 (Assess): https://www.youtube.com/watch?v=U_E9JxNFpcQ
Roger's Information Security Blog: http://feeds2.feedburner.com/RogersInfosecBlog
Darknet: https://www.darknet.org.uk/feed/

  1. A key feature of hybrid IDPS systems is event correlation. After researching event correlation online, define the following terms as they are used in this process: compression, suppression, and generalization.
  2. ZoneAlarm is a PC-based firewall and IDPS tool. Visit the product manufacturer at www.zonelabs.com and find the product specification for the IDPs features of ZoneAlarm. Which ZoneAlarm products offer these features?
  3. Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used, and how can they be used to compare the features and components of each IDPS? Create a comparison spreadsheet to identify the classification systems you find.
  4. Use the Internet to search for a “live DVD security toolkit.” Read a few Web sites to learn about this class of tools and their capabilities. Write a brief description of a live DVD security toolkit.
  5. Several online passphrase generators are available. Locate at least two on the Internet and try them. What did you observe?
  6. Go to a popular online e-commerce site like Amazon.com. Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the Web browser and select “Properties.” What can you find out about the cryptosystems and protocols in use to protect this transaction?
  7. Repeat Exercise 6 on a different Web site. Does this site use the same or different protocols? Describe them.
  8. Perform a Web search for “Symantec Desktop Email Encryption (powered by PGP Technology).” Download and install the trial version. Using the tool and your favorite e-mail program, send a PGP-signed e-mail to your instructor. What looks different in this e-mail compared with your other e-mails?
  9. Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is a FIPS 197 standard. Write a short overview of the development and implementation of this cryptosystem.
  10. Search the Web for “steganographic tools.” What do you find? Download and install a trial version of one of the tools. Embed a short text file within an image. In a side-by-side comparison, can you tell the difference between the original image and the image with the embedded file?

Participation Requirements:

Consult the grading rubric in the Faculty & Course Info section for the grading criteria.

Original discussion board posts:

Create a thread for your original post identified with your name.
An average of 350-500 words in length with proper punctuation, capitalization, and grammar.
Include supportive evidence, such as direct applicable experience and expert sources.
Due no later than Wednesday, 11:59 pm, CT
Responses to discussion board posts:

Respond to two peers, minimum (you are expected to continue to engage with peers and instructor beyond these two responses)
Initial Peer responses due Friday, 11:59 pm, CT
Remain engaged in the discussion through Sunday, 11:59 pm, CT

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS