Homework 03
Homework 03
TODAY’S DATE:
Although database server is the primary critical asset that stores intellectual property and webserver is
used to access the data by authorized users from the Internet, the attack surface includes all of the
assets you see in the figure.
Assets (Attack surface): Database server, user workstations, internal & DMZ switch, Webserver, DNS
server, firewall, router, and company employees.
As a result, hackers have been trying all possible ways of exploiting vulnerabilities in these assets.
Moreover, the activities of internal employees should also be observed, and it should be confirmed that
they follow the need-to-know principle and don’t perform malicious activities.
Select one of the following monitoring tools that also have strong network security monitoring
capabilities. Please carefully review the website of the software you chose.
1. Nagios
2. Cacti
3. Solarwinds
Explain how this network monitoring tool helps security administrators in detecting the following cases.
Feel free to provide the names of the modules/plugins/agents of the selected tool. Select at least three
attack case for your answer.
Question 2
You are the security administrator of this network; please draft a network operational procedure that
lists the steps of discovering one of the three malicious behaviors you selected in the previous question.
You can conduct research of existing procedures on the web.