Review article - cyber security vulnerabilities

Assignment Help Software Engineering
Reference no: EM132173435

Review this article with 2 APA format references.

In this day and age technology continues to advance at an alarming pace and with it an increase in the amount of cyber security vulnerabilities. A software or hardware intrusion detection system attempts to monitor and provide early detection of suspicious or malicious activity on weak and vulnerable hosts.

This line of defense is a necessity for any corporation to protect its assets and personnel. Intrusions detection systems (IDS) can be broken down into two distinct groups: network based and host based. To be most effective, a network based IDS (NIDS) must be tactically positioned within a network to be able to identify attacks that happen on hosts of that particular network.

Capturing the data normally requires placing sensors, or "taps", at the entrance and exit points of the network as it traverses to and from the wild dirty Internet (Mamun, 2012). There are several advantages to utilizing a NIDS. NIDS are relatively easy to deploy as they are not dependent upon a specific infrastructure or operating system. Having no requirement for software at the host level also reduces the overall cost of the system once it''s installed on the network.

NIDS are able to detect malicious activity in real time, respond accordingly, and retain the data for forensic analysis. Some disadvantages of the NIDS include: frequent amount of false positives highly susceptible to protocol based attacks continual updates to signature library to remain relevant Host based intrusion detection systems (HIDS) run on software that has been installed on individual hosts that monitor traffic coming in and going out from that specific host (Rouse, 2008).

HIDS also monitor the file structure of the host it''s installed on looking for changes to the audit and event logs. It compares any changes to known attack signatures and alerts the management console if a match is identified which makes it very useful in identifying if an actual attack took place. Because HIDS are software based, they do not require any supplementary hardware. One of the biggest disadvantages of utilizing a HIDS is that they are vulnerable to any attacks against the host operating system.

If the host operating system is compromised then the HIDS is as well. HIDS also takes up sizable amounts of hard disk space and can negatively affect system performance overhead due to amount of resources it consumes while running (Stallings, 2007).

References Mamun, S. (2012). Host based IDS vs Network based IDS.

Host-based and Network-based Intrusion detection systems.

Introduction to network-based intrusion detection systems.

Verified Expert

A software or hardware intrusion detection system attempts to monitor and provide early detection of suspicious or malicious activity on weak and vulnerable hosts. This line of defense is a necessity for any corporation to protect its assets and personnel. Intrusions detection systems (IDS) can be broken down into two distinct groups: network based and host based. To be most effective, a network based IDS (NIDS) must be tactically positioned within a network to be able to identify attacks that happen on hosts of that particular network. Capturing the data normally requires placing sensors, or “taps”, at the entrance and exit points of the network as it traverses to and from the wild dirty Internet. This paper is written in Microsoft Word Document File.

Reference no: EM132173435

Questions Cloud

Profitmaximizing output and advertising levels : What are the profitmaximizing output and advertising levels? What are the profits?
What is the economic life of the press : The College Park Sheet Metal Works (CPSMW), a very profitable Maryland corporation, purchased a press for $18,000. The annual operating and maintenance costs.
What is the total profit per week : You have 100 identical customers each with the relevant demand function Q=20-P (where Q is the hours per week and P is the per hour fee)
Calculate the economic life of the system : Transport International Incorporated (TII) is purchasing a new heavy-duty tractor-trailer truck for $250,000 and installing some special equipment on it.
Review article - cyber security vulnerabilities : Identify attacks that happen on hosts of that particular network - technology continues to advance at an alarming pace and with it an increase in the amount
What kinds of systems are described in this case : What kinds of systems are described in this case? Identify and describe the business processes each supports.
Offshoring verses not offshoring : What do you think about the debate in the text that addresses, “Offshoring Verses Not Offshoring”
Will there be any rural-urban migration as things stand : Urban modern/formal sector employment can be obtained with a 0.25 probability and pays $5 per day. The urban traditional/informal sector pays 80 cents per day.
Increased interest in entrepreneurship : Will the increased interest in entrepreneurship cause difficulties for companies that require a traditional workforce?

Reviews

Write a Review

Software Engineering Questions & Answers

  What model would you use for this estimation

One of the most difficult aspects of planning software development is estimating the effort. Often times we are asked to provide the estimate early in the process and even before all requirements are known.

  Calculate the standard absorption cost of a package

Calculate the standard absorption cost of a package of 10 stamp pads. (Do not round your intermediate calculations. Round final answer to 2 decimal places.)

  What was the first mud

What was the first MUD? What were the different types of MUDs? Do people still play MUDs today? What modern game genre has largely replaced MUDs?

  Golden star winery produces midlevel wines consumed

golden star winery produces midlevel wines consumed primarily in north america. given below is the projected income

  Question 1a write class weather to contain the following-i

question 1a write class weather to contain the following-i data members- humidity airpressure atmospherictemperature

  Create a z schema that adequately describes the wtc system

ITECH7410 Software Engineering Methodologies - create a Z schema that adequately describes the WTC system and how to demonstrate that your system specification

  Explain why is a flowchart useful in developing and

write a 200 to 300 -word answer response to each of the following questionquestion 1 why is a flowchart useful in

  Calculate the monthly management fee payable

Which manages rental properties and charges the owner a management fee - the For Realz Accountant has devised the following rules to calculate the monthly management fee payable.

  Why is the definition of the system logistics and

answer the module review questions listed below. these questions were chosen to demonstrate your understanding and help

  Principles of software project scheduling

List out and explain the basic principles of software project scheduling?

  Why is it significant to use systems analysis and design

why is it important to use systems analysis and design methodologies when building a system? why not just build the

  Why does flaw appear and what could be done to prevent it

Name a specific design flaw that could arise in a medical system. Why does the flaw appear and what could be done to prevent it

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd