Assignment 3

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Assignment 3

In the field of cybersecurity, tools like Snort and Splunk play crucial roles in detecting and
responding to threats. Snort is an open-source intrusion detection and prevention system (IDPS)
that monitors network traffic and alerts administrators about suspicious activity. Splunk, on the
other hand, is a powerful platform for collecting, searching, and analyzing machine-generated
data, including logs from various sources like applications, servers, and networks. This
assignment aims to explore the features and uses of Snort and Splunk in cybersecurity.

Snort
Explain how Snort works to detect and prevent network intrusions, including the use of
signatures and rules.
Submit your assignment as a comprehensive report in PDF format.
Include screenshots, configuration files, and any other relevant documentation to support your
findings.
Splunk
Find a real-world use case or case study where Splunk was used in a cybersecurity context.
Summarize the use case and analyze how Splunk was effective in detecting and responding to
cyber threats.

You might also like