Assignment Week1Chapter1 Tukkapuram
Assignment Week1Chapter1 Tukkapuram
By
Webster University
Abstract
For this assignment, the current nature of IDS in detecting and handling cyber threats as
investigated. IDS is specifically used to monitor and report the event of an intrusion or attack, it
lacks the ability to actively prevent such an occurrence, hence a strong correlation with other
active
systems such as Intrusion Prevention Systems (IPS). The mitigation practices for IoT security are
things like authentication, encryption, segment of network, and updates. It is further noted that a
1. How effective are current intrusion detection systems in identifying and responding to
cyber threats?
IDS are security appliances that the Chapter 1 refers to as analyzing IP data
streams
in search of typical attack and malice profiles. However, IDSs are considered as being
passive forms of systems – they can detect and notify about intrusions, they will not stop
malicious traffic. This consequence limits their ability in eliminating threats without the
1. Strengths:
potential threats.
2. Limitations:
IDS is not independent; it can only trigger alarms rather than taking direct
actions.
review by administrators.
IDS cannot counter threats by itself, but they must integrate with other
Prevention Systems (IPS) where in add to detecting threats the system has the capability
faces.
2. What are the best practices for securing Internet of Things (IoT) devices within
organizational networks?
1. Strong Authentication:
Always use passwords for all your applications and services and make
sure you use different passwords and make sure your applications accept multiple
2. Encryption:
Upgrade the devices used to cover up existing holes and bring in security
enhancements.
4. Network Segmentation:
Isolate IoT devices from other systems with valid functionalities in order
to minimize risks.
5. Access Controls:
Avoid using devices as much as possible or restrict the use of devices only
6. Security Monitoring:
IoT equipment.
8. Physical Security:
Week -1 Assignment 1 | 5
Secure devices physically so that nobody gets at them and starts to tamper
with them.
References
Kim, D., & Solomon, M. G. (2023). Fundamentals of Information Systems Security (4th ed.).
Cited for the discussion on IDS and their ability as well as shortcomings in the detection of
threats and the necessity for IDS reinforcements through the use of IPS. Also, for the better
tactics for IoT security; authentication, Encryption, firmware updates, Network segmentation,