Why use an ids, Computer Network Security

WHY USE AN IDS?

IDS prevent from problem behaviors by increasing the perceived risk of discovery and punishment. Detect the attacks and other security violations. Detect and at the same time deal with preambles to attacks. Document the existing threat to an organization. Act as quality control for security design and administration, especially of complex and large enterprises and provide useful information about intrusions which take place.

The following are reasons for an organization to install IDS

1.  They serve as straightforward deterrent measures.
2.  They cover organization when its network fails to protect against known vulnerabilities.
3.  They help administrators detect the preambles to attacks.
4.  They serve to document the scope of the threats an organization face
5.  They help in quality assurance and continuous improvements of the organization

Posted Date: 10/9/2012 3:38:44 AM | Location : United States







Related Discussions:- Why use an ids, Assignment Help, Ask Question on Why use an ids, Get Answer, Expert's Help, Why use an ids Discussions

Write discussion on Why use an ids
Your posts are moderated
Related Questions
Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

I need a help on how to write good assignment on the above topic

Question: a) Explain what the following intermediate systems are and how they work? i. Repeater ii. Bridge b) A service is formally specified by a set of primitives (op

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

RING topology all computers are connected in loop. A ring topology is a network topology in which every node connects to exactly two other devices, forming a single continuous pa

doing coursework in Network Security to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design shou

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S