Information Security Fundamentals

About this essay
About this essay
How can I use this essay sample?
You can use the free samples as references, and sources, and for finding quotes, and citations. They can be helpful to learn about formatting, styles, and different types of essay structures. They're also a great source of inspiration!
Who wrote this sample and why are these essays free?
These samples are written by graduate students who have donated them to us and by our own expert writers. We only accept writing samples from experienced and qualified writers. The essays are free because we want to help all students, regardless of their financial situation. This is why we offer a mix of paid and free services and tools.
Is it plagiarism to use sample essays?
If you use the essay as a whole, then yes. These samples are only examples and someone else's work. You should paraphrase and cite everything you use from sample essays properly.

Answer the following questions. Use complete sentences.
1. How does a false positive alarm differ from a false negative one? From a security perspective, which is least desirable? A false positive attack is where the system IDPS was alarmed but no attack ever occurred. The false negative is where an actual attack occurs and the IDPS isn’t alarmed at all. The least desirable would definitely be the false negative, if an attack does occur and the IDPS doesn’t even alarm well what’s the point in even having it if it isn’t going to alarm.

2. What is a honeypot? How is it different from a honeynet? A honeypot is a decoy system that will lure potential hackers away from the networks critical systems. A honeynet is where the system subnet is constantly changing and it lures attackers away by redirecting the the subsystems that are rich in information.

3. What capabilities should a wireless security toolkit include? Definitely should be able sniff incoming packets, scan the wireless hosts, and be able to view the level of privacy.

Get quality help now
Dr. Karlyna PhD
Dr. Karlyna PhD
checked Verified writer

Proficient in: Communication

star star star star 4.7 (235)

“ Amazing writer! I am really satisfied with her work. An excellent price as well. ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

Keeping an eye on vulnerability is a must because wireless networks can be a little easier to breach especially if the right security measures are not implemented.

4. A key feature of hybrid IDPS systems is event correlation. After researching event correlation online, define the following terms as they are used in this process: compression, suppression, and generalization. Compression is when it will take several occurrences and will examine it multiple duplicates. Suppression is where the IDPS will just alert you if something major has happened instead of it just triggering off something simple it will still let you know that something triggered it.

Get to Know The Price Estimate For Your Paper
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

Associates alarms with higher leveled events, can be useful when corresponding with multiple failed ports.

5. ZoneAlarm is a PC-based firewall and IDPS tool. Visit the product manufacturer at, and find the product specification for the IDPS features of ZoneAlarm. Which of the ZoneAlarm products offer these features?

6. Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used, and how can these be used to compare the features and components of each IDPS? Create a comparison spreadsheet identifying the classification systems you find.

7. Use the Internet to find vendors of thumbprint and iris scanning tools. Which of these tools is more economical? Which of these is least intrusive?

8. There are several online passphrase generators available. Locate at least two of them on the Internet, and try them out. What did you observe?

Cite this page

Information Security Fundamentals. (2016, Mar 10). Retrieved from

Information Security Fundamentals

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment