Question

There are security devices that allow users to monitor network activity directly on the appliance...

There are security devices that allow users to monitor network activity directly on the appliance. Discuss the pros and cons of conducting analysis on the device as opposed to using a centralized analytics solution, like a Security Information Manager (SIM).

0 0
Add a comment Improve this question Transcribed image text
Answer #1

pros and cons of conducting analysis:

1. It refer the collection of data into a central database for trend analysis.

2. This program translate that data into correlated and simplifies formats.

3. It often normalize the data.

4. it allows better processing.

5 It generates reports which allow the user to have an understanding of what is happening.

6 It is more reliable in its alerts than single computer security device.

Add a comment
Know the answer?
Add Answer to:
There are security devices that allow users to monitor network activity directly on the appliance...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1. As a Network and Security Administrator, you are asked to monitor employee activity during the...

    1. As a Network and Security Administrator, you are asked to monitor employee activity during the day. Your AUP policy does not permit the use of outside devices. You noticed a rogue device on your network. What procedures do you follow to eliminate and prevent future usage of this device on your network? What happens to the owner of the device, who is NOT employed at your company? 2. You as a small business owner have chosen NOT to comply...

  • Thoughts and feedback on this? According to Cisco, a network device manufacturer, a firewall is a...

    Thoughts and feedback on this? According to Cisco, a network device manufacturer, a firewall is a security device that can analyze network traffic and determine if it needs to be blocked or allowed per predetermined rules.1 Most modern PC operating systems, as well as Wi-Fi routers, have a built-in firewall which is mostly suitable for a single endpoint or SOHO. Enterprise firewall appliances are more powerful and configurable than consumer-grade software-based firewalls, pfSense, for example, supports advanced features such as IDS/IPS,...

  • ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired...

    ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....

  • The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local...

    The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local intranet. The CTO would like the capability to monitor all traffic to and from the gateway, as well as the capability to block certain content. Which of the following recommendations would meet the needs of the organization? A. Recommend setup of IP filtering on both the internal and external interfaces of the gateway router. B. Recommend installation of a firewall on the internal interface...

  • Elliot & Hesse Inc. Manufactures ergonomic devices for computer users. Some of its more popular products...

    Elliot & Hesse Inc. Manufactures ergonomic devices for computer users. Some of its more popular products include glare screens (for computer monitor), keyboard stands with wrist rests, and carousels that allow easy access to discs. Over the past 5 years, it experienced rapid growth, with sales of products increasing 20% to 50% each year. Last year, some of the primary manufacturers of computers began introducing new products with some of the ergonomic designs, such as glare screens and wrist rest,...

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • true and false questions: In addition to the members of the information system department, end users...

    true and false questions: In addition to the members of the information system department, end users are considered the members of the organization using the information system. * True False A business model describes how a company produces, delivers, and sells a product or service to create wealth. * True False Digital Dashboards display, on a single screen, graphs and charts of Key Performance Indicators for managing a company by high level managers. * True False An information system is...

  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT