Ids-information security, Computer Network Security

IDS
Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identification of, classification of, response to, and recovery from an incident. Intrusion prevention comprises of activities that seek to deter an intrusion from occurring. Intrusion detection consists of procedures and systems created and operated to detect the system intrusions. Intrusion reaction encompasses actions an organization undertakes when intrusion event can be detected. Intrusion activities of finalize restoration of operations to a normal state. IDS detect a violation of its configuration and activate alarm. Many IDSs enable administrators to configure systems to directly notify them of trouble by means of e-mail or pagers. Systems can be configured to notify an external security service organization of a break-in. The figure given below illustrates the basic functionalities of intrusion detection system.

 

 

626_ids.png

 

 

 

Posted Date: 10/9/2012 3:38:10 AM | Location : United States







Related Discussions:- Ids-information security, Assignment Help, Ask Question on Ids-information security, Get Answer, Expert's Help, Ids-information security Discussions

Write discussion on Ids-information security
Your posts are moderated
Related Questions
This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Normal 0 false false false EN-US X-NONE X-NONE

Size of Option field of an ip datagram is 20 bytes. What is the value of HLEN? What is the value in binary?

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

QUESTION (a) One of the biggest drawbacks that GNS3 has is that it supports only the IOS images of routers. This means that users cannot emulate Cisco switches. Suggest two sol

Implementing an effective online authentication scheme in practice faces many challenges. Systems with highly sensitive data often require multifactor authentication. But, requirin

The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

(a) Figure is a representation of a TCP header. For each of the fields lettered from A to G, state the name of the field and provide a brief explanation for the function of each fi

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I