in response to your peers apply a systems thinking approach and provid
Search for question
Question
In response to your peers, apply a systems-thinking approach and provide recommendations on
resolving the issue or reducing the impact of false positives or negatives from an IDS/IPS.
To complete this assignment, review the Discussion Rubric.
For your response posts, do the following:
•
Reply to at least two classmates outside of your own initial post thread.
. In Module One, complete your two response posts by
•
In Modules Two through Eight, complete your two response posts
Demonstrate more depth and thought than saying things like “I agree” or “You are wrong.”
Guidance is provided for you in the discussion prompt.
Criteria
Comprehension
Exemplary
Discussion Rubric
Develops an initial post with
an organized, clear point of
view or idea using rich and
significant detail (100%)
Proficient
Develops an initial post
with a point of view or idea
using adequate
organization and detail
(85%)
Needs Improvement
Develops an initial post with a
point of view or idea but with
some gaps in organization and
detail (55%)
Not Evident
Does not develop an
initial post with an
organized point of view
or idea (0%) Criteria
Timeliness
N/A
Engagement
Writing (Mechanics)
Exemplary
Provides relevant and
meaningful response posts
with clarifying explanation
and detail (100%)
Writes posts that are easily
understood, clear, and
concise using proper citation
methods where applicable
with no errors in citations
(100%)
Proficient
Needs Improvement
Submits initial post on time Submits initial post one day
(100%)
Provides relevant response
posts with some
explanation and detail
(85%)
Writes posts that are easily
understood using proper
citation methods where
applicable with few errors
in citations (85%)
late (55%)
Provides somewhat relevant
response posts with some
explanation and detail (55%)
Writes posts that are
understandable using proper
citation methods where
applicable with a number of
errors in citations (55%)
Not Evident
Submits initial post two
or more days late (0%)
Provides response posts
that are generic with little
explanation or detail
(0%)
Writes posts that others
are not able to understand
and does not use proper
citation methods where
applicable (0%)
Response one
8-1 Discussion: IDS/IPS and the Intelligence Cycle
Valerie Hulon
IDS and IPS can serve a critical role in an organization as a first line of defense against malicious
activities. Both of these systems log detailed information about the traffic and patterns they
Total deliver, including IP addresses (both source and destination), timestamps, protocol details, and
payload snippets. This data is invaluable in understanding the traffic flow and identifying
anomalies and patterns that may indicate a compromise or attack. Using a threat intelligence feed
that includes up-to-date information on IP addresses, file hashes, and URLs associated with
malicious activities can enrich the data already being analyzed by an IDS/IPS significantly. The
correlation of incoming network traffic to known malicious indicators provided can help the
IDS/IPS identify and respond to threats more efficiently, faster, and with more accuracy. Proactive
approaches like this help security teams to prioritize their responses better and adapt their
defensive strategies based on real-time global threat data.
Response Two
8-1 Discussion
Karl Reddick
Hello class and congrats on making it to week 8! We made it!
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are crucial technologies
that help organizations gather data about activities within their network. IDS monitors network
traffic for suspicious activity or security policy violations, while IPS actively blocks or prevents
attempted intrusions. One example of a threat intelligence source is the Open Source Intelligence (OSINT) feeds, which
provide information on known malicious IP addresses, domains, or signatures. By leveraging OSINT
feeds, organizations can stay updated on the latest threats and indicators of compromise.
When correlating data from an operational IDS/IPS with threat intelligence sources like OSINT
feeds, organizations can enhance their security posture in the following ways:
1. Identifying Known Threats: IDS/IPS alerts can be compared with threat intelligence sources to
check for matches with known malicious indicators. This correlation helps in quickly identifying and
responding to threats based on established patterns.
2. Behavioral Analysis: By analyzing the network traffic patterns detected by IDS/IPS in
conjunction with threat intelligence, organizations can uncover anomalous behavior that may
indicate a new or evolving threat.
3. Enhanced Response: Correlating IDS/IPS data with threat intelligence allows security teams to
prioritize and respond to threats effectively. It helps in focusing on the most critical alerts that
pose a significant risk to the network.
4. Threat Hunting: Security analysts can proactively search for indicators from threat intelligence
feeds within their network data collected by IDS/IPS to uncover potential threats that may not have
been detected initially.
By integrating threat intelligence sources with IDS/IPS data, organizations can create a more robust
security defense mechanism that is proactive, informed, and capable of identifying and mitigating
threats in real-time.