• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Lecture & Notes
    • Lecture 1: Introduction to Incident Response and Intrusion management
    • Lecture 2: CIRT
    • Lecture 3: Wireshark / Packet Captures
    • Lecture 4: IDS/IPS
    • Lecture 5: Detecting Intrusion
    • Lecture 6: Escalation
    • Lecture 7: LOGS / SIEM
    • Lecture 8: LOGS where to get them
    • Lecture 9: SOC : How to build a SOC for Incident Response Center
    • Lecture 10: SPLUNK
    • Lecture 11: Executive Brief
    • Lecture 12: Final
  • Assignments
    • Short Paper 1
    • Short Paper 2
    • Short Paper 3
    • Term Paper
    • Executive Brief: Presentation
  • Blog Post
    • Welcome
    • Week 2 Blog
    • Week 3 Blog
    • Week 4 Blog
    • Week 8 blog
  • LABS
    • LAB 1
    • LAB 2
    • LAB 3
    • LAB 4
    • LAB 5
    • LAB 6
  • Webex
  • Gradebook

Intrusion Detection & Response

Temple University

Deval Shah

Week 09: Question

July 20, 2017 by Deval Shah 17 Comments

Please identify a Process that is utilized within SOC Environment, and please explain why you feel that it is the most one?

Week 08: Question

July 10, 2017 by Deval Shah

Incident Response and Intrusion management has a lot to do with Information.  As far as cyber security is concerned its about LOGS.

What strategy would utilize in terms Logs.  Log Everything, Selectively Log, or something else.  Please provide your views on this important topic!

Notification on date change

July 5, 2017 by Deval Shah

Term Paper: Changed from 7/10 -> 7/17

Quiz 2 – Change from 7/17 -> 7/23

Short Paper 3 will change from 7/23 -> 7/30

Presentation will remain.

Week 6: Question

June 20, 2017 by Deval Shah

Modern day networks are no longer static, they are continuously morphing with a mobile workforce and presence of data everywhere. How can organizations monitor the environment for onslaught of threats and endless attack vectors.  Provide some comments and insights on where you would start with your IDS implementation strategy?

Week 4: Question

June 5, 2017 by Deval Shah

When it comes to IDS, there are various things to consider:  Host – IDS (HIDS) vs Network IDS (NIDS).  There is also Signature Based vs Anomaly Based.  And finally IDS vs IPS.  How does one figure out figure out what to use and when?  Provide your views on the various IDS techniques and what is the best approach to working through them?

Week 3: Question

May 29, 2017 by Deval Shah

Since Packet capture is an integral part of Intrusion Management strategy, the question remains, what factors influence an organizations Packet Capture strategy?  Please provide some insight into some of these factors and why they are or are not relevant?

Week 03: No class on Monday

May 26, 2017 by Deval Shah

Please note that there is no class on Monday(5/29/2017) due to Memorial day.  But we will host the class on Wednesday(5/31/2017) from 5:30 PM to 8 PM.  Also do not forget to submit your short paper assignment.
Have a nice weekend​.

Week 2: Question

May 21, 2017 by Deval Shah

What are the similarities and differences from the following groups (Help Desk, SOC, CERT, CIRT, etc) within an enterprise?

Week 1: Question – Ransomware on the global scale?

May 2, 2017 by Deval Shah

The past week we show an intensive Ransomware attack on the global scale.  Assume your organization was a victim of such attack?  Would you pay the ransom, Why or Why Not?

Primary Sidebar

Weekly Discussions

  • Week 01
  • Week 02
  • Week 03
  • Week 04
  • Week 06
  • Week 08
  • Week 09

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in