A. Discussion deals with security controls available for Operating systems and more specifically it deals with HIDS and AVs.
1. Based on your research, what are some of the most common issues with deployment of HIDS in an organization with 1000s of computers?
2. As far as viruses are concerned, are we fighting a losing battle? Are there too many and is the problem too rampant?
B. Discuss your thoughts on the following:
3. Why are honeypots important to a network? Discuss the disadvantages of having a honeypot in the network.
4. Discuss three approaches of acquiring information needed to penetrate a network.
Please include relevant resources or references