Security automation responses | Information Systems homework help

Provide (2) 200 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.


1. The Information Security Automation Program (ISAP) allows for the automation of information security by creating components that are made by integrating systems that are meant for standalone use together into one. This essentially allows for them to cover each others bases by performing their primary functions in tandem with each other. Two of the strengths that come with this are security scan results that provide an in-depth view of security risks, making it easier to find and correct security downfalls, and users will be able to create their own set of security tests and run them with the provided tools, allowing for reduced maintenance time on the security system.

2. Intrusion Detection Systems (IDS) generally work in tandem with firewalls, constantly watching and logging network traffic and reporting any abnormalities while the Intrusion Prevention System (IPS) denies access to those abnormalities. With these too working in your security system you will essentially be able to have your network available to its users with less downtime to deal with intrusions.

3. If properly configured, IDS and IDP can work together to locate and identify an intrusion as well as prevent it with needing any user assistance. The logs provided could be used to look into reoccurring abnormalities and prevent them from further attempts of intrusion. Attempts at intrusion are inevitable on any network but even more so when inept users are added to the equation. Having these two along with other automated systems will prevent this vulnerability from becoming an issue.


1. Briefly list and explain two strengths of one of the technologies discussed in “The Second Wave” reading:

One strength or advantage is many vendors have developed plug-ins to their products that make them SCAP-compatible. This is the only common language in the industry, which is important if organizations are planning to purchase new testing or reporting applications. Another component or strength of SCAP benchmarks, audit tests and system evaluations.

2. Explain how a properly configured IDS/IPS system can feed into your overall security plans.

An intrusion prevention system (IPS) usually sits directly behind the firewall, adding another layer of analysis that removes dangerous contents from the data flow. The intrusion prevention systems continuously monitor your network, looking for possible malicious incidents and capturing information about them. That way the administrator can decide what to do with the threat alert or can simply set an automated action to different threats.

3. Explain how the use of an IDS/IPS system can fit into the security automation process:

Where IDS informs of a potential attack, an IPS makes attempts to stop it. Another huge leap over IDS, is that IPS has the capability of being able to prevent known intrusion signatures but also some unknown attacks due to its database of generic attack behaviors. Thought of as a combination of IDS and an application layer firewall for protection, IPS is generally considered to be the “next generation” of IDS. 


Ramirez, D. (n.d.). JOnline: Information Security Automation: The Second Wave. Retrieved from

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more