Why use an ids, Computer Network Security

WHY USE AN IDS?

IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at the same time deal with preambles to attacks. Document the existing threat to an organization. Act as quality control for security design and administration, especially of complex and large enterprises and provide useful information about intrusions which take place.

The following are reasons for an organization to install IDS

1.  They serve as straightforward deterrent measures.
2.  They cover organization when its network fails to protect against known vulnerabilities.
3.  They help administrators detect the preambles to attacks.
4.  They serve to document the scope of the threats an organization face
5.  They help in quality assurance and continuous improvements of the organization

Posted Date: 10/9/2012 3:38:44 AM | Location : United States







Related Discussions:- Why use an ids, Assignment Help, Ask Question on Why use an ids, Get Answer, Expert's Help, Why use an ids Discussions

Write discussion on Why use an ids
Your posts are moderated
Related Questions
Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

Broadcasting is the distribution of video and audio content to a whole audience via any audio or visual mass communications medium, but generally one using electromagnetic radiat

Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

QUESTION (a) Define and distinguish between Electronic Commerce and Electronic Business (b) According to you what are the benefits that Electronic Commerce can brings to org