Why use an ids, Computer Network Security

WHY USE AN IDS?

IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at the same time deal with preambles to attacks. Document the existing threat to an organization. Act as quality control for security design and administration, especially of complex and large enterprises and provide useful information about intrusions which take place.

The following are reasons for an organization to install IDS

1.  They serve as straightforward deterrent measures.
2.  They cover organization when its network fails to protect against known vulnerabilities.
3.  They help administrators detect the preambles to attacks.
4.  They serve to document the scope of the threats an organization face
5.  They help in quality assurance and continuous improvements of the organization

Posted Date: 10/9/2012 3:38:44 AM | Location : United States







Related Discussions:- Why use an ids, Assignment Help, Ask Question on Why use an ids, Get Answer, Expert's Help, Why use an ids Discussions

Write discussion on Why use an ids
Your posts are moderated
Related Questions
QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I

Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated

Hardware, Software, and Network Asset Identification What information attributes to track is dependent on: •    Requires of organization/risk management efforts •    Management

Issue-Specific Security Policy (ISSP) The ISSP addresses specific areas of technology, needs frequent updates and having statement on organization’s position on a particular iss

QUESTION a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the uppe

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Probelm 1: Give the History and Evolution of Wireless Communication System. Complete explanation Probelm 2: Describe the process of Components Identification and cal

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th