Ask a question from expert

Ask now

Project Dissertation Proposal: Next Generation Cybertrap

12 Pages4471 Words188 Views
   

Added on  2019-10-18

Project Dissertation Proposal: Next Generation Cybertrap

   Added on 2019-10-18

BookmarkShareRelated Documents
Project Dissertation ProposalTitle:Next-Generation Cybertrap For Corporate Intrusion Detection Servers and Intrusion Prevention Servers in Enterprise Business.By:Supervised by:
Project Dissertation Proposal: Next Generation Cybertrap_1
Table of ContentsAbstractAim and ObjectivesIntroduction and BackgroundLiterature ReviewTechnologies and ResourcesMethods and Work planEthics AspectsConclusionReference2
Project Dissertation Proposal: Next Generation Cybertrap_2
Next-Generation Cybertrap For Corporate Intrusion Detection Servers and Intrusion Prevention Servers in Enterprise BusinessAbstractNext Generation Intrusion Prevention Systems is also term as Intrusion Detection & PreventionSystems (IDPS). Here we can see that Next Generation Cyber trap for corporate intrusion detectionsserver and intrusion prevention servers in Enterprise business that consists of different networksecurity applications which monitor the network and suspicious activities in the system. This systemis going to protect the business from existing and upcoming attacks as well as provides regularcontrol over the system and preventing from cyber threat. The expertise of Next-generationintrusion prevention system helps in protecting the important data and information as well asapplications from most advanced cyber-attack without harming the enterprise production and itssystem performance. Our project is mainly focused on explaining the different mitigationmethodologies or techniques used by corporate for storing information and data that is going to beused in the network system. Further, in our paper, we are going to discuss more these things. In thistype of mitigation plan, the attackers are not able to penetrate inside the system and outside thesystem to secure fully. After implementing this system in the corporate we will be able to find thetypes of attacks and methods used by the attackers so that we can easily install that technology inour system to protect information and data against different types of cyber threats. Aims and Objectives The main aim of this project is to find out that whether the organizations have enough securitymeasures to protect or prevent the information and data from cyber-attacks on the World WideWeb. The main objectives for selecting this project are to find out whether the available securitystandards and security practices are capable to protect the organizational data and information fromsecurity threats and attacks. Cyber trap products nowadays installed in the private and public sectorsall over the world. Cyber trap products mainly applied to analyze the big data for monitoring thetraffic in the network and provide visibility on both the end of the network of the organizations. Italso provides a plan for the organization to show how they can secure their data and information.Also, the cyber trap system is going to provide the information about IP and other suspiciousactivities of the user as well as a system administrator. The cyber trap technology is going tosupport the different type of technology among currently available technologies in the market andfrom another different type of security threat situations. Nowadays, different types of organizationswhich have daily multiple types of traffic generations at the applications level and from anotherdifferent type of security threats use a cyber trap to protect their network. Different types ofsecurity threats are possible so that most of the largest global organization uses cyber trap methodsto manage and secure the information and identities as well as their technology infrastructure.Cyber trap is the leading solutions that can provide security to loss of data and information over thesystem network of the organizations.Introduction 3
Project Dissertation Proposal: Next Generation Cybertrap_3
As we see that nowadays network is a form of the business. Many of the organization and enterpriseas well as agencies of government have created user-friendly and tough networks of information aredeveloped according to the need of the business and users. At current scenario, most of thetechnologies come with encryption facilities, wireless, VOIP and secure data storage as well asdifferent type of web technology through which web services are going to be accessed by thesystem of the organization. In today times, most of the customers now do transaction by using thenetwork of the organization. For attackers and hackers, this network path is making the networksystem more vulnerable due to which they have to put only little effort to break the security breachof the network. Currently, so many people look at the internet as a platform to gather the importantand sensitive data as well as information. However, at the same time, we see that intrusion detectionand prevention systems (IDPS) point out the threats or intruders before they can harm anything onthe network as well as a system of the organization. Intrusion detection system is a type of softwareapplication, which monitors the networks and suspicious activities in the system. These suspiciousactivities are going to be reported to the network administrator as well as Security information andevent management (SIEM) system. SIEM system is basically a combination of various outputsources and also they use techniques of alarm filtering to spot the suspicious activities on thenetwork by activating the false alarm.In an organization when the system has capabilities of response then they normally come under theintrusion prevention system. As we see that when any type of business rise and evolve, then theyneed to develop their already existing network as well as need to upgrade their network. Toimplement this we should analyze the existing network and the needs of a new network which isimportant to the company. By doing this we can easily find out what new equipment and otherrelated things are required to upgrade that the new network of the company fully which supports thecurrent and future requirements of the organization. In so many cases, according to the needs ofbusiness, there are different types of network connection technologies. To add a new user so manysmall and medium companies start adding different type of hardware devices with differentqualities and from different manufacturers. Due to new users, the network strength starts degrading.If these things are continued then the available network is not able to support the traffic whichnetwork generated due to an increase in the numbers of users. When the network starts failing then the company decide to redesign their network. Also, thenetwork service provider and ISP generally provide the installation facilities of new devices and anadvice on how to maintain the upgradation of the network. The design of the network mainlydepends upon the present and future demands of the business to ensure the development of thecompany by implementing the right technology. This paper is going to discuss the benefits of next-generation cyber trap for intrusion prevention server and intrusion detection servers in corporate orenterprise business. In this, we also were going to explain the IDS product benefits and thetechnology that IDS is going to provide for effective protection to the data and information of theenterprise or corporate business. It also provides knowledge about the different standard of securityand methods to protect the data and information of the organization from the outside attack as wellas cyber-attack. Literature Review4
Project Dissertation Proposal: Next Generation Cybertrap_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Project Dissertation: Next Generation Cybertrap
|56
|12775
|162

Next-Generation Cybertap For Corporate Intrusion Detection
|10
|4380
|172

Project Dissertation | Next-Generation Cybertrap
|57
|12770
|276

Next-Generation Cybertrap For Corporate Intrusion Detection Servers and Intrusion Prevention Servers in Enterprise Business
|60
|14078
|321

Next-Generation Cybertrap For Corporate Intrusion Detection and Prevention
|11
|2647
|482

Cyber Security Improvement Plan Proposal
|5
|928
|93