Complete the real world exercises at the end of the chapter. Write your answers in complete sentences and use APA formatting rules. Each answer should be a minimum of 1 paragraph (3 or more sentences)
End of chapter 5 Real world exercises (page 218)
1-3
End of chapter 6 Real world exercises (page 257)
1-3
Chapter 5:
1. Using a Web browser, look for the open source and freeware intrusiondetection tools listed in the chapter. Next, identify two to three commercialequivalents. What would the estimated cost savings be for an organization touse the open source or freeware versions? What other expenses would theorganization need to incur to implement this solution?2. Using a Web browser, search on the term intrusion prevention systems. What are thecharacteristics of an IPS? Compare the costs of a typical IPS to an IDPS. Do they differ?What characteristics justify the difference in cost, if any?3. Using a Web browser, visit the site www.honeynet.org. What is this Web site, and whatdoes it offer the information security professional? Visit the “Know your Enemy” whitepaperseries and select a paper based on the recommendation of your professor. Read itand prepare a short overview for your class.
Chapter 6:
1. Using a Web browser, search for “incident response training.” Look throughthe first five results and identify one or two companies that offer such training.Pick one company and look at the course offerings. Locate a course that cantrain you to create a CSIRT. How many days will that course take?2. Using a Web browser, search for “incident response template.” Look through the firstfive results and choose one for further investigation. Take a look at it and determine ifyou think it would be useful to an organization creating a CSIRT. Why or why not?3. Visit the Web site at www.first.org/global/practices. Look for information about bestpractices contests. When was the last one held and in which city? What value wouldsuch a contest have for individuals interested in incident response?
