IT3075C-002: Network Monitoring & IPS
Student Name
Assignment 03:
The Sensor Platform
In the diagram above, place your sensors in the appropriate places to monitor for risks you calculated in the previous lab. To do this, select the image in the legend, copy and paste. The keyboard commands are ctrl+c (
⌘
+c) and then ctrl+v (
⌘
+v)
. Then drag the sensor to the location on the network topology. Below is an example.
Collection Only
Half-Cycle
Full Cycle Detection
Explain why you chose the types of sensor you have and explain the locations you chose.
Since there is less risk associated with collection only censorship, it is the strategy I went
with. In addition, I put censors between the router and the firewall and between the workstations and the firewall itself. I have these filters in order to better understand the kind of
data that are passing over the firewall and onto employee PCs and the internet. In order to help
inform the network if something is acting up, I have Half-cycle sensors of medium risks installed
with the Client Penn tests, Account Information, and Client Information. Finally, since the client billing has the largest danger, I install a Full Cycle Detection sensor directly on it.