Why use an ids, Computer Network Security


IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at the same time deal with preambles to attacks. Document the existing threat to an organization. Act as quality control for security design and administration, especially of complex and large enterprises and provide useful information about intrusions which take place.

The following are reasons for an organization to install IDS

1.  They serve as straightforward deterrent measures.
2.  They cover organization when its network fails to protect against known vulnerabilities.
3.  They help administrators detect the preambles to attacks.
4.  They serve to document the scope of the threats an organization face
5.  They help in quality assurance and continuous improvements of the organization

Posted Date: 10/9/2012 3:38:44 AM | Location : United States

Related Discussions:- Why use an ids, Assignment Help, Ask Question on Why use an ids, Get Answer, Expert's Help, Why use an ids Discussions

Write discussion on Why use an ids
Your posts are moderated
Related Questions
Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t

Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

how to link html with a data base

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

In this assignment, you are required to emulate the operation of a link layer and network layer protocols in a small computer network. Your program should behave like a single node

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

IPV6 DATAGRAM FORMAT It is given in the figure below:

Problem 1: Discuss how TWO of the following gurus have contributed to the Quality Movement, highlighting the major points of their philosophies: (a) Edward Deming (b) Jose