CSEC 640: Monitoring, Auditing, Intrusion Detection, Intrusion Prevention, and Penetration Testing
A revised lab manual for CSEC 640, focusing on monitoring, auditing, intrusion detection, and penetration testing in cybersecurity.
Claire Mitchell
Contributor
4.3
32
about 1 month ago
Preview (5 of 14)
Sign in to access the full document!
CSEC 640: Monitoring, Auditing, Intrusion Detection, Intrusion
Prevention, and Penetration Testing
1. Using Snort and Wireshark, analyze a packet trace file to detect network intrusions. Write
six distinct Snort rules and explain each rule's functionality, including the alert generated
for each.
(Word count requirement: 300-350 words)
2. Discuss the purpose of the various flags used in the Snort command snort -r snort.out -P
5000 -c csec640.rules -e -X -v -k none -l log.
(Word count requirement: 150-200 words)
3. Review the Gimmiv.A exploit and discuss the vulnerabilities it targets and suggest
possible mitigation strategies.
(Word count requirement: 200-250 words)
Prevention, and Penetration Testing
1. Using Snort and Wireshark, analyze a packet trace file to detect network intrusions. Write
six distinct Snort rules and explain each rule's functionality, including the alert generated
for each.
(Word count requirement: 300-350 words)
2. Discuss the purpose of the various flags used in the Snort command snort -r snort.out -P
5000 -c csec640.rules -e -X -v -k none -l log.
(Word count requirement: 150-200 words)
3. Review the Gimmiv.A exploit and discuss the vulnerabilities it targets and suggest
possible mitigation strategies.
(Word count requirement: 200-250 words)
Preview Mode
Sign in to access the full document!
100%
Study Now!
XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat
Document Details
University
University of Maryland
Subject
Information Technology