Intrusion Detection and Prevention Systems (IDPS): Enhancing Network Security

An Intrusion Detection and Prevention System (IDPS) is in place to monitor the health and status of organizational networks and devices. Next Generation Firewalls typically have intrusion detection and other advanced machine analytics capabilities built in.
Discussion Checklist
Discuss the concept of IDPS.
Where should IDPS be implemented in your IT infrastructure?
Your initial post should address the seed questions in either the technology or workflow group below.
Technology: What is the difference between an IDS and an IPS? Why is it important to perform a network traffic baseline definition analysis? If a Snort IDS captures IP packets off a LAN segment for examination, is this an example of promiscuous mode operation? Are these captured packets saved or logged? What is the difference between a host-based and network-based IDS?
Workflow: What are the benefits to increasing the levels of automation in network monitoring? What are the cognitive tradeoffs in offloading monitoring and analysis tasks to IDPS technology? What can people who work in cyber and security monitoring do with the time they get back via automation? Are there risks? What should the threshold be for an IDPS to take a direct action on the network without human intervention?

Understanding Security Architecture and Planning: The Purpose of Software Development and the SDLC

Understanding security architecture and planning; the purpose of software development and the SDLC
In support of a ‘Secure Development Lifecycle’ (Chapter 2. Ransome J. and Misra A. Core Software Security Auerbach Publications 2018 e-)) and through the use of the ‘Seven Touchpoints for Software Security’ (Chapter 3 McGraw G. Software Security: Building Security in Addison-Wesley 2006 ff)) outlined below, document and define how each of these seven touchpoints are relevant to the case study provided 4..
1. Code review
2. Architectural risk analysis
3. Penetration testing
4. Risk-based security tests
5. Abuse cases
6. Security requirements
7. Security operations
Given the case study, and each of the seven touchpoints, write a summary of how each of the touchpoints are relevant to the architecture and development life cycle of the system proposed.

 

The Distinction Between Coding and Programming: Importance and Age of Introduction in Education

We are living in an age where coding and programming is starting to become popular. Discuss the difference between coding and programming. In your discussion explain which one you think is the most important and at what age do you think your choice should be introduced in school?

Laws and Responsibilities in [Potential Profession]

 

Watch and Read the following:

https://www.archives.gov/founding-docs/constitution-transcript

Paper instructions:
Respond to the following prompts:

List two laws or regulations that relate to your potential profession. Describe the intent of each and how they are implemented (to the best of your ability).
Given what you have learned, what are the responsibilities of practitioners in the field that relate to each law or regulation? What is the responsibility of those who create these rules or regulations? How would you balance these responsibilities?

The Declaration of Independence

Explain, in your own words, what the second paragraph of the Declaration of Independence means. Please provide a response for all 7 concepts. Why did our founders want to see these changes implemented and what values are reflected?

“1) We hold these truths to be self-evident,
2) that all men are created equal,
3) that they are endowed by their Creator with certain unalienable Rights,
4) that among these are Life, Liberty and the pursuit of Happiness.
5) That to secure these rights, Governments are instituted among Men,
6) deriving their just powers from the consent of the governed,
7) That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness.”
use the following resources:
https://www.archives.gov/founding-docs/declaration-transcript

 

Security Assessment Report (SAR)

Based on the Assignment Scenario, determine the risk associated with the vulnerabilities. Use NIST SP 800-30 https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf to calculate the risks for each vulnerability.

Part 1 – Report Risk
Develop a 2- to -3-page Security Assessment Report (SAR) using the Wk 4 Assignment Template https://myresource.phoenix.edu/secure/resource/CYB407v2/CYB407_v2_Wk4_Assignment_Template.docx. The Security Assessment Report (SAR) should include the following for each vulnerability:
• Vulnerability title
• A precise vulnerability description
• Likelihood
• Impact
• Overall risk level
• Logical recommendations for mitigation

Part 2 – Communicate the Risk to Leadership
Develop a 10- to 12-slide Microsoft® PowerPoint® presentation documenting the risks for each vulnerability to be presented to the leadership of Health Coverage Associates.

The presentation should include:
• An introduction slide
• A description of each of the three vulnerabilities
• An accurate illustration of the NIST SP-30 5×5 matrices
• A description of the likelihood and impact, with a justification of that determination (e.g., very low, low, moderate, high, very high)
• An illustration of the overall, high watermark level of risk (e.g., very low, low, moderate, high, very high)
• A logical recommendation for mitigation actions, including an explanation of risk tolerance and risk acceptance for the organization
• A conclusion slide
• Detailed speaker notes

Be sure to include supportive graphics and appropriate backgrounds and styles. All references need to adhere to APA guidelines. Images should not be copied, unless author permission is obtained or copyright-free images are used.

Understanding CPT Coding and Its Distinction from ICD-10 PCS Procedure Codes

Using Chapter 3 of your text as your reference,
• Describe CPT coding
• Include information about HCPCS
• Identify the six main sections of the CPT classification system that has coding guidelines for the use of codes within that section.
• Explain how CPT codes are different from ICD -10 PCS procedure codes.