skip to Main Content

John is the parent of a twelve-year-old daughter named Erin. Erin, along with so

John is the parent of a twelve-year-old daughter named Erin. Erin, along with some friends at her school, joins a new social networking site called XYZ.net (a fictitious website). Erin enters her personal information on the website during registration but lies about her age claiming she is age sixteen. The social networking site has also gained unauthorized access to the computer network at Erin’s middle school to target more of Erin’s classmates to join the site and to obtain personal…

This week, you will be reading about intrusion detection and incident response.

This week, you will be reading about intrusion detection and incident response. For this discussion, assume that you are a cloud security engineer for Target.com. A botnet, primarily using Russian IP addresses, is attempting to brute force your system to gain access to your customer's credit cards and other PII. For this discussion, please answer the following two questions:How do you detect this intrusion (what methods were you applying/tools you were using to notice this attempt in the first place);…