The Host Intrusion Detection System

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Intrusion Detection and Prevention are very important in a secure system, but the company currently does not have any IDS. You are to make recommendations to the company about Intrusion Detection and Prevention, including what type of information should be gathered during a breach.

INTRODUCTION

In this task 2, I am asking about the recommendation for their company, which is Your Music Company about the Intrusion Detection and Prevention with include the type information during a breach. In the Your Music Company, there are many threats and are also have secure the problem how to handle this situation problem.

INTRUSION DECTECTION

Intrusion Detection is generally a type of security management system modern technology servers and for being used in computer and network. In other words in network meaning for ICS is "A collecting of one or more sensors, often linked to management software, used to detect and report the existence of security vulnerabilities on a network." TECH INSIDER, 24 June 2002

Figure 2.1 Intrusion Detection System Basic

Intrusion Detection only has THREE components:

HOST INTRUSION DETECTION SYSTEM

(HIDS)

HONEYPOTS

NETWORK INTRUSION

DECTECTION

SYSTEM

(IDS)

2 2

3

1

Network Intrusion Detection System (NIDC)

NIDS is a system that usually used by monitor and analyzes network traffic function technology and give to protection system from network based threats.

It also analyse the manual network and whether check it first before process searching wrong on it.

Host Intrusion Detection System (HIDS)

HIDS is usually are already installed of a version product which required on a computer system to monitor devices system in a wide range of activity occurring on the production system

First of all HIDs will work operates with HIDs Installing the software on existing server and process steps for configuring sensor HIDs seconds to send the correct events HIDs manager. After the fourth step is to allow the test phase in which the sensor is monitored HIDs. So why the server is always different processing cycle and functions for server use during the test phase. Once the testing phase is completed, the sensors go into production and professional security monitoring all incoming events welcome. The final step of the life cycle maintenance process must to be able to update the sensor HIDS.

Honeypots

Honeypots are systems made ​​designed misuse invited to allow their monitoring malicious activity.

When events are sent to the console, an operator first looks at the event itself to determine if it appears to be a real attack or false positive.

The IDS can provide the following:-

Provide stability higher archived of integrity to the rest your infrastructure.

Able to provider trace user activity from points of several points.

ADVANTAGES

DISADVANTAGES

Able to give good and excellent secured as observe traffic.

Allow us to know about detect scans its be much useful and be better on other hand of signature

Always be false negative is higher rate in which it’s difficult to control the whole modern technology network.

Possibly they are also to operate the encrypted packets on still processing difficult.

Didn’t much look different to see the impacts of an attack that places.

INTRUSION PREVENTION

Intrusion Prevention is a system software modern technology protection that able to provided in a network for malicious activity for example a security threat or policy violent.

PREVENT THREAT

ADVANTAGES

DISADVANTAGES

When the hacker are stolen breaking the data information computer server technology, it must be genius to think about to prevent the threat which is to installed intrusion prevention system to provided those activity block or prevent intrusion that are damages. In business technology organization worlds must to be creatively comprehensive network intrusion prevention system to avoid hackers from stolen all information data computer network.

In another way to prevent threat is:-

Firewall

Antivirus, such as worm, Trojan horse, BotNet, etc

To resolve ambiguities in passive network mentoring by placing detection system in on line.

When the user installed software product such as firewall is to provided considerable improvement system modern technology network.

Able to control by using the IPS.

Being good literal extension of IPS.

Enable low rate of false positives

Some to other sides didn’t discovered attacks

Servers usually up to date the data information.

When already installed they are some broken functionally this will have not performing correctly.

Figure 2.2 Intrusion Prevention Diagram

TYPES OF INFORMATION TO BE GATHERED DURING BREACH

In a YourMusic company, many several of data in during breaches such as date, time duration and location of breach is a NIDS (Network Intrusion Detection System). I suggested that NIDS is to apply during breach because is a security advanced professional modern information technology used by today. So , in this case NIDS is a better useful for YourMusic company.

Another way to fit in gather all information is IDS already recorded by their system during their breaches using this log information server company. IDS are also to be professional server to review the all detail network traffic to be indeed by attack. Therefore, to improved their company system another day by day. That is also help to prevents all alarm warning security able to protected intruder broken data information is called computer crime.

RECOMMENDATION FOR YOUR MUSIC COMPANY

This part of recommendation, I suggested that used IDS for own good benefits or advantages for YourMusic company. Therefore, IDS is the strongest system, so they need to pro-active monitoring and maintenance, as well as redundancy to conduct YourMusic company business on a daily basis and upload and download of critical data.

CONCLUSION

In this final task, I have also suggested that the best suitable IDS/IPS types for YourMusic company. So particular for support the entire system their company and for prevent the damaged data system technology. Today, technology modern network services is upgrade to higher archived around the worlds, it is the higher archived bigger for producing suitable for their network.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now