Ids-information security, Computer Network Security

IDS
Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identification of, classification of, response to, and recovery from an incident. Intrusion prevention comprises of activities that seek to deter an intrusion from occurring. Intrusion detection consists of procedures and systems created and operated to detect the system intrusions. Intrusion reaction encompasses actions an organization undertakes when intrusion event can be detected. Intrusion activities of finalize restoration of operations to a normal state. IDS detect a violation of its configuration and activate alarm. Many IDSs enable administrators to configure systems to directly notify them of trouble by means of e-mail or pagers. Systems can be configured to notify an external security service organization of a break-in. The figure given below illustrates the basic functionalities of intrusion detection system.

 

 

626_ids.png

 

 

 

Posted Date: 10/9/2012 3:38:10 AM | Location : United States







Related Discussions:- Ids-information security, Assignment Help, Ask Question on Ids-information security, Get Answer, Expert's Help, Ids-information security Discussions

Write discussion on Ids-information security
Your posts are moderated
Related Questions
Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Discuss the risks of having a single root user

Question (a) Consider that you enter the subsequent URL in the address bar of a popular web client and that both the server and client accepts HTTP version 1.1. i. What can be

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

UDP DATAGRAM FORMAT: It is given in the figure below:

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni