• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Lecture & Notes
    • Lecture 1: Introduction to Incident Response and Intrusion management
    • Lecture 2: CIRT
    • Lecture 3: Wireshark / Packet Captures
    • Lecture 4: IDS/IPS
    • Lecture 5: Detecting Intrusion
    • Lecture 6: Escalation
    • Lecture 7: LOGS / SIEM
    • Lecture 8: LOGS where to get them
    • Lecture 9: SOC : How to build a SOC for Incident Response Center
    • Lecture 10: SPLUNK
    • Lecture 11: Executive Brief
    • Lecture 12: Final
  • Assignments
    • Short Paper 1
    • Short Paper 2
    • Short Paper 3
    • Term Paper
    • Executive Brief: Presentation
  • Blog Post
    • Welcome
    • Week 2 Blog
    • Week 3 Blog
    • Week 4 Blog
    • Week 8 blog
  • LABS
    • LAB 1
    • LAB 2
    • LAB 3
    • LAB 4
    • LAB 5
    • LAB 6
  • Webex
  • Gradebook

Intrusion Detection & Response

Temple University

Week 06

Week 6: Question

June 20, 2017 by Deval Shah

Modern day networks are no longer static, they are continuously morphing with a mobile workforce and presence of data everywhere. How can organizations monitor the environment for onslaught of threats and endless attack vectors.  Provide some comments and insights on where you would start with your IDS implementation strategy?

Primary Sidebar

Weekly Discussions

  • Week 01
  • Week 02
  • Week 03
  • Week 04
  • Week 06
  • Week 08
  • Week 09

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in