19.3k views
2 votes
The Chief Information Security Officer (CISO) for an organization wants to develop custom IDS rulesets faster, prior to new rules being released by IDS vendors.

Which of the following BEST meets this objective?

A. Identify a third-party source for IDS rules and change the configuration on the applicable IDSs to pull in the new rulesets
B. Encourage cybersecurity analysts to review open-source intelligence products and threat database to generate new IDS rules based on those sources
C. Leverage the latest TCP- and UDP-related RFCs to arm sensors and IDSs with appropriate heuristics for anomaly detection
D. Use annual hacking conventions to document the latest attacks and threats, and then develop IDS rules to counter those threats

1 Answer

4 votes

Final answer:

The best option is to encourage cybersecurity analysts to review open-source intelligence products and threat database to generate new IDS rules based on those sources. so, option B is the correct answer.

Step-by-step explanation:

The BEST option to meet the objective of developing custom IDS rulesets faster is to B. Encourage cybersecurity analysts to review open-source intelligence products and threat database to generate new IDS rules based on those sources.

This option allows the organization to leverage the knowledge and expertise of its cybersecurity analysts to proactively identify and create new IDS rules based on open-source intelligence products and threat databases. By reviewing these sources, analysts can stay informed about emerging threats and develop rulesets to protect the organization's systems.

This option is ideal because it empowers the organization to be self-reliant rather than relying solely on the release of new rules by IDS vendors. It also ensures faster response time to emerging threats, as the organization's analysts can generate new rules in a timely manner.

User FyodorX
by
7.9k points