StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Intrusion Detection System - Assignment Example

Cite this document
Summary
The aim of the essay “Intrusion Detection System” is to examine HIDS, an intrusion detection system that screens and scrutinizes the internal parts of a computer system, and its own network interface. The system protects against attacks on the computer memory…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Intrusion Detection System
Read Text Preview

Extract of sample "Intrusion Detection System"

Intrusion Detection System A system equipped to fight against firewall, malwares, and offers protection against viruses is not novice. This is because protecting the computer against these attacks is an essential part of computer management and protection policy. I agree with this argument of Justin concerning HIDS. HIDS is an intrusion detection system that screens and scrutinizes the internal parts of a computer system, and its own network interface. The system protects against attacks on the computer memory.

QUESTION 2I agree with this argument of David, since a layered defense provide security to a computing system At three different levels with the aim of preventing an attack from a virus, malwares, worms, theft, un-authorized access and other security risks. The three levels are the system, network and application levels. The HIDS, and NIDS are protective mechanisms, in a computing system that detects and prevents efforts of accessing information from an-authorized parties. I agree with the notion that NIDS is widely based, since the computer administrator can install it at various destinations all over the internal computer system.

I agree with the notion that HIDS is installed in a workstation, or server. This is because the system is an agent of the secured host. Due to this, HIDS serves a particular host, and can serve a particular purpose.Question 3 I agree with David’s answer that the methods of security testing are the white, black and gray box testing. However, I do not agree with the answer that the black box testing system involves knowing the architecture and design of the computer before the testing.

Black-box system does not entail any knowledge of the architecture, or the interior workings of the computer system, while white box testing involves knowledge of the architecture and design of the computer system. Grey box system involves testing the computing system with limited knowledge of the system, and not as defined by David. I agree with the notion that the person conducting black box testing is an end user. This is because the person doing the test cannot access the source code of the computing system.

I also agree with the notion that a system designer conducts white box testing. This is because the test requires extensive knowledge on the internal structure and logic of the computer system. I agree with the notion that beta tester perform grey box testing.Question 3(b) I agree with David’s notion that Vulnerability testing seeks to identify weaknesses in a computer system, and on his notions that vulnerability tests seeks to identify the best places to attack a system. I agree with answer concerning penetration testing, and its application.

Question 4 I agree with Kevin’s explanation on white box, black box, and grey box testing. Kevin’s rightfully explains vulnerability and penetration testing.Question 5 I agree with Richards answer on ethnic tensions, and it main cause is the conflicting views of the cultures of different ethnic groups. In United States of America, there are social structures in place to prevent an emergence of armed conflict emanating from ethnic tensions, e.g. equitable distribution of resources, and efficient law enforcement agencies.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Intrusion Detection System Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Intrusion Detection System Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1607052-class-discussions
(Intrusion Detection System Assignment Example | Topics and Well Written Essays - 500 Words)
Intrusion Detection System Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1607052-class-discussions.
“Intrusion Detection System Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1607052-class-discussions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Intrusion Detection System

Intrusion detection systems

IDS is the short form for the intrusion detection Systems.... IDS is the short form for the intrusion detection Systems.... These systems basically find out the manner in which unwanted signals towards the systems are manipulated.... In fact there are a host of different kinds that come under the IDS heading… Moreover,coming to the point of these manipulations which occur in the first place,we discern that these are the usual attacks that are carried out by the hackers who are skilled and quite adept at their work and even at times,script kiddies do play these tricks whereby they make use of the automated scripts to achieve their objectives....
8 Pages (2000 words) Essay

An improvement of Intrusion Detection System using HCI

People use Intrusion Detection System (IDS) applications as assistant tools to detect illegal activities that will cause damage to their computer systems or networks.... IDS users can be categorized from two perspectives: (1) their knowledge about network/system security management; and (2) the time and effort that they could put into intrusion detection.... Network/system specialists and administrators mostly know more about computer networks and systems than regular computer system owners....
14 Pages (3500 words) Essay

Wireless Intrusion Detection Systems

He explains the intrusion methods, need for wireless Intrusion Detection System and as well identify the rewards and problems of wireless intrusion detection systems.... In the paper “Wireless intrusion detection Systems” the author analyzes security and detection of possible threats to wireless networks.... Usually, this is done as a hobby and such hobbyists may combine the data with Global Positioning system (GPS) information to generate geographic maps of wireless networks in the area and their configurations....
4 Pages (1000 words) Essay

Intrusion Detection

The accomplishment of the Intrusion Detection System or IDS offers a great advantage for the detection of the possible security concerns and attacks on time and effective handling of these concerns (Sans, 2009).... An Intrusion Detection System or IDS is hardware and software based system to identify unwanted efforts at accessing, disabling or manipulating computer systems, mostly in the course of a network, such as the Internet.... An Intrusion Detection System is also utilized to identify numerous forms of malicious behaviors that are able to compromise the security as well as trust of a computer system....
2 Pages (500 words) Essay

Security Network Intrusion detection system (IDS)

A network Intrusion Detection System (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP… Below is discussed a case study and important actions which become necessary in case of network intrusion. If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192.... 24 and Network Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network's security....
2 Pages (500 words) Essay

Ethical Hacking Techniques

Scanning is the deliberate process of trying to access the systems to get a response, while enumeration collects additional in-depth information to ensure the… An Intrusion Detection System (IDS) is a system that oversees network traffic or host audit logs to recognize violations in system security (Information Assurance Technology Analysis Center (IATAC), 2009, p.... ntrusion Detection System An Intrusion Detection System (IDS) is a system that oversees network traffic or host audit logs to recognize violations in system security (Information Assurance Technology Analysis Center (IATAC), 2009, p....
2 Pages (500 words) Essay

IDS Systems - Snort and Bro

The structure of this paper is as follows: first of all, an overview of the Intrusion Detection System is provided, the next two sections present an overview of the two IDS systems and after that, a comparison of these two IDSs is presented.... asically, an Intrusion Detection System is an application or device utilized to scrutinize the entire network traffic and notify the administrator or user when there has been an illegal effort or access.... Relying on the application or device utilized the Intrusion Detection System that would be able to either simply observe the administrator or user or it could be placed up to automatically respond in some way or block specific traffic (Bradley, 2015)....
12 Pages (3000 words) Case Study

Purpose of Intrusion Detection and Detection Techniques

According to Sundaram (1996) “an automatic intrusion detection that performs automated intrusion detection is acknowledged as an IDS or Intrusion Detection System” (Sundaram, 1996).... An Intrusion Detection System can be either network-based, in the host-based it checks system logs or calls, or network-based if it observes network packets flow during the commutation.... urpose of IDSs and Detection TechniquesAccording to Bradley (2009), an Intrusion Detection System is an application or device utilized to scrutinize the entire network traffic as well as alert the administrator or user when there has been an illegal effort or access....
5 Pages (1250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us