Review article - cyber security vulnerabilities

Assignment Help Software Engineering
Reference no: EM132173435

Review this article with 2 APA format references.

In this day and age technology continues to advance at an alarming pace and with it an increase in the amount of cyber security vulnerabilities. A software or hardware intrusion detection system attempts to monitor and provide early detection of suspicious or malicious activity on weak and vulnerable hosts.

This line of defense is a necessity for any corporation to protect its assets and personnel. Intrusions detection systems (IDS) can be broken down into two distinct groups: network based and host based. To be most effective, a network based IDS (NIDS) must be tactically positioned within a network to be able to identify attacks that happen on hosts of that particular network.

Capturing the data normally requires placing sensors, or "taps", at the entrance and exit points of the network as it traverses to and from the wild dirty Internet (Mamun, 2012). There are several advantages to utilizing a NIDS. NIDS are relatively easy to deploy as they are not dependent upon a specific infrastructure or operating system. Having no requirement for software at the host level also reduces the overall cost of the system once it''s installed on the network.

NIDS are able to detect malicious activity in real time, respond accordingly, and retain the data for forensic analysis. Some disadvantages of the NIDS include: frequent amount of false positives highly susceptible to protocol based attacks continual updates to signature library to remain relevant Host based intrusion detection systems (HIDS) run on software that has been installed on individual hosts that monitor traffic coming in and going out from that specific host (Rouse, 2008).

HIDS also monitor the file structure of the host it''s installed on looking for changes to the audit and event logs. It compares any changes to known attack signatures and alerts the management console if a match is identified which makes it very useful in identifying if an actual attack took place. Because HIDS are software based, they do not require any supplementary hardware. One of the biggest disadvantages of utilizing a HIDS is that they are vulnerable to any attacks against the host operating system.

If the host operating system is compromised then the HIDS is as well. HIDS also takes up sizable amounts of hard disk space and can negatively affect system performance overhead due to amount of resources it consumes while running (Stallings, 2007).

References Mamun, S. (2012). Host based IDS vs Network based IDS.

Host-based and Network-based Intrusion detection systems.

Introduction to network-based intrusion detection systems.

Verified Expert

A software or hardware intrusion detection system attempts to monitor and provide early detection of suspicious or malicious activity on weak and vulnerable hosts. This line of defense is a necessity for any corporation to protect its assets and personnel. Intrusions detection systems (IDS) can be broken down into two distinct groups: network based and host based. To be most effective, a network based IDS (NIDS) must be tactically positioned within a network to be able to identify attacks that happen on hosts of that particular network. Capturing the data normally requires placing sensors, or “taps”, at the entrance and exit points of the network as it traverses to and from the wild dirty Internet. This paper is written in Microsoft Word Document File.

Reference no: EM132173435

Questions Cloud

Profitmaximizing output and advertising levels : What are the profitmaximizing output and advertising levels? What are the profits?
What is the economic life of the press : The College Park Sheet Metal Works (CPSMW), a very profitable Maryland corporation, purchased a press for $18,000. The annual operating and maintenance costs.
What is the total profit per week : You have 100 identical customers each with the relevant demand function Q=20-P (where Q is the hours per week and P is the per hour fee)
Calculate the economic life of the system : Transport International Incorporated (TII) is purchasing a new heavy-duty tractor-trailer truck for $250,000 and installing some special equipment on it.
Review article - cyber security vulnerabilities : Identify attacks that happen on hosts of that particular network - technology continues to advance at an alarming pace and with it an increase in the amount
What kinds of systems are described in this case : What kinds of systems are described in this case? Identify and describe the business processes each supports.
Offshoring verses not offshoring : What do you think about the debate in the text that addresses, “Offshoring Verses Not Offshoring”
Will there be any rural-urban migration as things stand : Urban modern/formal sector employment can be obtained with a 0.25 probability and pays $5 per day. The urban traditional/informal sector pays 80 cents per day.
Increased interest in entrepreneurship : Will the increased interest in entrepreneurship cause difficulties for companies that require a traditional workforce?

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd