There are several lines of defense available to network and security administrators, including intrusion prevention and detection technologies. The activities and tools that are available to monitor and test the security levels on a modern network are varied. They range from free open source to very expensive and sophisticated technologies. They come in single-use solutions and best-of-breed solutions, which are typically suites of network management applications that perform a variety of activities.
In this assignment you explain various monitoring tools and methods available to network administrators.
Write 3–4 pages in which you consider the following aspects of network monitoring.
Choose a common packet inspection tool and explain how it works to mitigate threats.
Describe three criteria that a network or security administrator might use when selecting a network monitoring tool.
Describe a security policy that is designed to ensure that an organization’s information is not compromised by internal IT staff.
Sample Solution
One common packet inspection tool is Wireshark. Wireshark is an open source packet analyzer that can capture and display data packets sent over a network. It allows administrators to see the data contained in each packet, which makes it useful for troubleshooting and monitoring traffic on a network. Wireshark also provides detailed information about how packets are routed across different networks, providing insight into potential security vulnerabilities. With this knowledge, administrators can take action to mitigate threats by blocking malicious traffic or enforcing stronger security policies. Additionally, users of Wireshark can filter out specific types of packets based on port numbers, IP addresses, or other criteria to better identify suspicious activity and focus their mitigation efforts accordingly.
Sample Solution
One common packet inspection tool is Wireshark. Wireshark is an open source packet analyzer that can capture and display data packets sent over a network. It allows administrators to see the data contained in each packet, which makes it useful for troubleshooting and monitoring traffic on a network. Wireshark also provides detailed information about how packets are routed across different networks, providing insight into potential security vulnerabilities. With this knowledge, administrators can take action to mitigate threats by blocking malicious traffic or enforcing stronger security policies. Additionally, users of Wireshark can filter out specific types of packets based on port numbers, IP addresses, or other criteria to better identify suspicious activity and focus their mitigation efforts accordingly.
military advantage over the other side. For example, in Syria and Iraq, there are a lot of cultural heritage sites with locations that have valuable features like being ‘on high ground, at important intersections or crossroads, near water’ (Foradori and Rosa 2017, 156). It is no coincidence that these sites have such a convenient spot. Back in the days, the sites have been built for certain purposes and over time they have not lost this feature (Foradori and Rosa 2017, 156). Foradori and Rose use 11th century castle Crac de Chevallier, medieval Aleppo’s Citadel and third century A.D. Bosra Castle, all Syrian cultural heritage on the UNESCO list as examples, saying that their ‘offensive and defensive values’ in terms of military defense features ‘are as pertinent in the current conflicts as they were when first constructed, which is precisely why all the parties have continued to battle for control over them,’ (Forador and Rosa 2017, 156). So, if these sites are in hands of the ones fighting IS, IS will have a military disadvantage and it might help the Global Coalition fighting Islamic State.
To conclude, successful protection of cultural heritage from destruction by the Islamic State could help the Global Coalition in the fight against Islamic State. Firstly, it will affect IS’s money supply, especially as their capital is already in decline. This will limit their financial resources. Secondly, IS will be less able to express its power and ideology and recruit members if they are not able to lay their hands on cultural heritage anymore. Through socially mediated terrorism, IS could use images of the destruction of cultural heritage to spread fear among the world and reach and attract new members with their ideology. IS might shift to deeds in which they focus more on human casualties, but the images of these practices will be less distributed among the world, as it is too cruel to show in the media, disabling IS to spread their ideology and to expand their territory. Lastly, as many cultural heritage sites have a strategic military position, the side who possesses the sites will have an advantage over the other side. This meaning that if the cultural heritage sites will not come in possession of IS, the international coalition will have a military advantage over IS. If measures are being taken, this will thus cut financial resources, cut a way to globally express strength, spread ideology and recruit members and take away a military advantage.
This essay could be useful for the Global Coalition that wants to counter the actions and the expansion of Islamic State, as it could help the Global Coalition to reach their goal. Furthermore, it stresses the i