Opening Hours
Call Us

Forensic Investigation.

Topic:ÿFinal Exam Description: [?] Preferred language style: English (U.S.) Page 1 of 2 1. There are four (4) questions on this exam, each of equal value. 2. Answer all four (4) of these questions. 3. Each question must be answered in your own words. However, when you use the words of others in any answers, you must use quotation marks and attribute the source right there following APA style. Also be sure to cite references right there using APA style when you paraphrase the words of others. 4. This is an open-book individual examination. You may use any resources in addition to the textbook, such as other books, articles, and the Web. Some questions may require research beyond the text, lecture notes, and conferences. You must, however, do your own work and you may not collaborate with your classmates. 5. Adequate answers for the entire examination should run approximately twelve (12) double-spaced pages (not much more) with one-inch margins and at least 10-point font. 6. You must also provide a separate bibliography for each question following APA style. The bibliography for each question is outside the scope of the twelve (12) double-spaced pages. 7. Answers will be evaluated on the following criteria: key content, logical flow, clarity, spelling, grammar, and proper citations/bibliography. Page 2 of 2 Final Exam Questions Question 1 Describe the relationship between computer forensics and IDS. Explain the ways IDS tools and techniques are used in computer forensics. Provide an example (outside of the text books), from the literature or a reliable source on the Internet, of a specific instance of where IDS contributed to a forensic investigation. Was the outcome a success? Explain why or why not. What role will data forensics have in the future (especially with the increased use of mobile technologies)? Question 2 Snort incorporates several add-on tools including Barnyard, Cerebus and Mudpit. Describe the purpose and capabilities of each of these tools, being sure to explain their relative differences and shortcomings. Is there any one that is more useful than the others? Explain why or why not. Describe the forces in the intrusion detection world that will shape the development of these add on- tools. With these forces in mind, what are the likely future features and functionality for each of the 3 tools? Within the Snort product, will any one tool become more dominant relative to the others? Why or why not? Question 3 Describe the various types of intrusion detection techniques and technologies available to an organization. Explain how the use of each has evolved over the last decade or so. In the context of today, discuss the ways that they could be used together in a coherent intrusion detection strategy. Question 4 An important aspect of intrusion detection is effective use of IDS/IPS tools and technologies to defend against specific types of attacks and misuse. Describe the specific types of attacks and misuse that exist. Search for at least 2 examples (outside of the text books) of how organizations have used IDS/IPS tools and technologies to defend against some of the specific types of attacks and misuse. Possible sources may include journal publications, news articles, white papers, or recommendations from analysts, or even case studies and customer testimonials about specific vendors in the market. From your research findings, how effective are these organizations at applying IDS/IPS to defend against some of the specific types of attacks and misuse? What can be done to improve the situation?

Do You Need A Similar or Related Assignment?

Wish Essays has been a choice of many for Custom Essays for over 10 years. Our writers and support staff are available 24/7.

Get an urgent order done within 6 Hours. YES 6 HRS !!!!!!!

If you need more clarifications contact our support staff via the live chat for immediate response.

Use the order calculator below and get ordering with

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page: