0% found this document useful (0 votes)
4 views5 pages

Assignment Week1Chapter1 Tukkapuram

The assignment investigates the effectiveness of Intrusion Detection Systems (IDS) in detecting cyber threats and highlights their limitations, such as being passive and requiring integration with other security systems like Intrusion Prevention Systems (IPS). It also outlines best practices for securing Internet of Things (IoT) devices, including strong authentication, encryption, regular firmware updates, network segmentation, access controls, security monitoring, device configuration management, and physical security. The document emphasizes the need for a multilayered strategy to enhance security in advanced IT environments.

Uploaded by

indepthtest97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views5 pages

Assignment Week1Chapter1 Tukkapuram

The assignment investigates the effectiveness of Intrusion Detection Systems (IDS) in detecting cyber threats and highlights their limitations, such as being passive and requiring integration with other security systems like Intrusion Prevention Systems (IPS). It also outlines best practices for securing Internet of Things (IoT) devices, including strong authentication, encryption, regular firmware updates, network segmentation, access controls, security monitoring, device configuration management, and physical security. The document emphasizes the need for a multilayered strategy to enhance security in advanced IT environments.

Uploaded by

indepthtest97
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Week -1 Assignment 1 | 1

Week 1 Assignment – Chapter 1

ITM 5600 TX S1 2025 - ITM Security

By

Revanth chary Tukkapuram

Webster University

Master of Arts in Information Technology Management

Professor: Héctor £. Pérez, Sr


Week -1 Assignment 1 | 2

Abstract

For this assignment, the current nature of IDS in detecting and handling cyber threats as

well as appropriate measures of IoT protection in organizational networks’ environment will be

investigated. IDS is specifically used to monitor and report the event of an intrusion or attack, it

lacks the ability to actively prevent such an occurrence, hence a strong correlation with other

active

systems such as Intrusion Prevention Systems (IPS). The mitigation practices for IoT security are

things like authentication, encryption, segment of network, and updates. It is further noted that a

multilayered strategy is insisted on to protect today’s advanced IT environments.

1. How effective are current intrusion detection systems in identifying and responding to

cyber threats?

IDS are security appliances that the Chapter 1 refers to as analyzing IP data

streams

in search of typical attack and malice profiles. However, IDSs are considered as being

passive forms of systems – they can detect and notify about intrusions, they will not stop

malicious traffic. This consequence limits their ability in eliminating threats without the

help of other systems.

Key points regarding the effectiveness of IDS:

1. Strengths:

 IDS can effectively identify malicious patterns in data streams.


Week -1 Assignment 1 | 3

 They tend to provide early warning signals to administrators about

potential threats.

 They are used in detecting known attacks when configured properly.

2. Limitations:

 IDS is not independent; it can only trigger alarms rather than taking direct

actions.

 There is a chance of false positives or negatives, thus requiring manual

review by administrators.

 IDS cannot counter threats by itself, but they must integrate with other

security technologies IDS, IPS, firewalls, and monitoring solutions.

To enhance effectiveness, organizations incorporate IDSs together with Intrusion

Prevention Systems (IPS) where in add to detecting threats the system has the capability

to prevent t hem as well, thus providing an organization an overall solution of threats it

faces.

2. What are the best practices for securing Internet of Things (IoT) devices within

organizational networks?

Security Recommendations on IoT Devices:

1. Strong Authentication:

Always use passwords for all your applications and services and make

sure you use different passwords and make sure your applications accept multiple

factors to enhance security.


Week -1 Assignment 1 | 4

2. Encryption:

The information should remain protected through the course of its

transmission as well as when it is stored through the use of encryption.

3. Regular Firmware Updates:

Upgrade the devices used to cover up existing holes and bring in security

enhancements.

4. Network Segmentation:

Isolate IoT devices from other systems with valid functionalities in order

to minimize risks.

5. Access Controls:

Avoid using devices as much as possible or restrict the use of devices only

to very important people.

6. Security Monitoring:

Permanently monitor the possible signs of suspicious actions or risks on

IoT equipment.

7. Device Configuration Management:

Disable unrequired components and switch from standard configuration

for more protection.

8. Physical Security:
Week -1 Assignment 1 | 5

Secure devices physically so that nobody gets at them and starts to tamper

with them.

References

Kim, D., & Solomon, M. G. (2023). Fundamentals of Information Systems Security (4th ed.).

Jones & Bartlett Learning.

Cited for the discussion on IDS and their ability as well as shortcomings in the detection of

threats and the necessity for IDS reinforcements through the use of IPS. Also, for the better

tactics for IoT security; authentication, Encryption, firmware updates, Network segmentation,

access control, and physical Security of Internet of Things .

You might also like