How often should IDS, antivirus, or antispyware signature files be updated?
II. Web Projects
A. Web Project 1
Go to Google.com to search for articles on honeypots. Find out the legal and
ethical issues involved with evidence collected by using a honeypot system. Is it an
intrusion if you set one up to be broken into? Is this a form of entrapment? Do honeypots
encourage break-ins? One place to start your research is an article titled “Honey pots: Are
They Illegal?” at http://www.linuxsecurity.com/content/view/114141/65 /.
B. Web Project 2
Many IT people say that Windows and IE are more susceptible to viruses and
spyware than Linux and Firefox. Go to Google.com and search for articles on Windows
versus Linux security. Which OS and browser is safe?
C. Web Project 3
Anomaly detection involves actual software that works to detect intrusion
attempts and notify the administrator. The system looks for any anomalous behavior. Any
activity that does not match the pattern of normal user access is noted. Go to Google.com
and search for information on how anomaly detection works and then answer the
question: How does the IDS define “normal” use? A good place to find information about
IDS system types is http://infosecuritymag.techtarget.com/articles/august01/cover.shtml.
D. Web Project 4
Microsoft recently acquired an antispyware company called “Giant.” As of this
writing, Microsoft has released a beta antispyware program. Go to Microsoft on the
Internet or to http://www.microsoft.com/athome/security/spyware/software/default.mspx
and find out what type of antispyware program it is and what issues exist in installing and
using this software.