Ids deployment overview, Computer Network Security

Assignment Help:

IDS Deployment Overview

The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should select deployment strategy based on careful analysis of organization’s information security needs but, at the same time, causes minimal impact. NIDS and HIDS can be used in tandem to cover both the individual systems which connect to an organization’s networks and networks themselves.

Deploying Network Based IDSs

NIST recommends 4 locations for NIDS sensors

- Location 1: behind each external firewall, in network DMZ
- Location 2: outside the external firewall
- Location 3: On the major network backbones
- Location 4: On the critical subnets

                                         This Figure given below illustrates the Network IDS sensor Locations.

 

 

                             441_IDS Deployment Overview.png


Related Discussions:- Ids deployment overview

Html, how to link html with a data base

how to link html with a data base

Address resolution protocol (arp), ADDRESS RESOLUTION PROTOCOL (ARP) T...

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

Network management system, Question (a) Draw a typical hybrid star-rin...

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router

Security and basics steps in writing thesis, how can i start thesis? Please...

how can i start thesis? Please mention so of examples?

ITC 571 Emerging Technologies and Innovation Assignment, Ask quProject brie...

Ask quProject brief template The project brief is a document upon which the full Project Proposal and Plan will be based. About me: Who are you? What do you do? What is your Exper

Plaintext, how to encryt the data in plaintext cipher

how to encryt the data in plaintext cipher

What do you understand by environmental accounting, Question : Environm...

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

Describe how ethernet deals with collisions, Problem (a) The IEEE 802 seri...

Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

Semester 2, Do you have assignment solutions for CCE UPES MBA for oil and g...

Do you have assignment solutions for CCE UPES MBA for oil and gas semester 2

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd