Why use an ids, Computer Network Security

WHY USE AN IDS?

IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at the same time deal with preambles to attacks. Document the existing threat to an organization. Act as quality control for security design and administration, especially of complex and large enterprises and provide useful information about intrusions which take place.

The following are reasons for an organization to install IDS

1.  They serve as straightforward deterrent measures.
2.  They cover organization when its network fails to protect against known vulnerabilities.
3.  They help administrators detect the preambles to attacks.
4.  They serve to document the scope of the threats an organization face
5.  They help in quality assurance and continuous improvements of the organization

Posted Date: 10/9/2012 3:38:44 AM | Location : United States







Related Discussions:- Why use an ids, Assignment Help, Ask Question on Why use an ids, Get Answer, Expert's Help, Why use an ids Discussions

Write discussion on Why use an ids
Your posts are moderated
Related Questions
QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

CRC can detect the following errors better than check sums. a) Vertical errors b) Burst errors a) VERTICAL ERRORS:  This kind of error happens due to a hardware fai

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

I need a help on how to write good assignment on the above topic

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

QUESTION a) A switch basically operates by forwarding frames from one part of the network to another, based on MAC address. Describe the three types of switching namely store

Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian