IDS Alert - Essay Example

Only on StudentShare

Extract of sample
IDS Alert

If my computer pointer starts moving by itself then I will at once pull out the network cable (LAN) or phone line from my PC as it is the point through which any external source can enter my PC. Port 3389 is a remote desktop connection port in windows which is usually opened in many computers on network. (Denning, 1990) A hacker can exploit it using a remote desktop connection and could send malicious threats or Trojans to gain access to the computer from this port. Removing my PC from the network will help isolate it and stop transferring the threat or virus to other Computers on the network.
A well define thought and planning is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.
After the computer has been isolated the next step would be to detect and remove the threat using the appropriate Intrusion Detection Systems. Updated versions of spy ware and Antivirus software will be installed on the PC if the current versions could not detect the threat. ...Show more

Summary

In this era of technology, Computer systems are under attack from various sources and through different techniques. Different kinds of worms, viruses and Trojan horses are used to attack and to gain access to the computer networks. Basically the IDS help in recognizing and observing the intrusion attempts made by any internal or outside party into the organization's network…
Author : lpredovic
IDS Alert essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"IDS Alert"
with a personal 20% discount.
Grab the best paper

Related Essays

Intrusion Detection System
Intrusion Detection is used to manage the system and the network in a secured manner. Intrusion may occur from various sources. (Endorf 2004).IDS must be capable of identifying the security threats and prevent them from affecting the system or network. These detection systems make use of various scanning technologies to know whether a network is secured or not.
14 pages (3500 words) Essay
IDS Policy
Basically the IDS help in recognizing and observing the intrusion attempts made by any internal or outside party into the organization's network. These systems are made to spot the threats and then take suitable measure to remove them. 1. Host based IDS: These are systems that are typically installed on the host systems that are planned to monitor.
2 pages (500 words) Essay
Intrusion detection systems
Moreover,coming to the point of these manipulations which occur in the first place,we discern that these are the usual attacks that are carried out by the hackers who are skilled and quite adept at their work and even at times,script kiddies do play these tricks whereby they make use of the automated scripts to achieve their objectives.
8 pages (2000 words) Essay
An improvement of Intrusion Detection System using HCI
The overall requirements for SnortReader are: (1) allow users to locate intrusions among Snort alerts in a short time; (2) allow users to change the behavior of the interface; and (3) provide help information to identify intrusions and how to use the interface.
14 pages (3500 words) Essay
Wireless Intrusion Detection Systems

The author provides some methods of protection. In passive methods radio frequency monitoring is used. The active systems can transmit signals to inquire the status of the network and also put in malicious data into the network to create interruptions. This is the most common methods and is on the rise since new abuse and tools emerge often.

4 pages (1000 words) Essay
Security Network Intrusion detection system (IDS)
Below is discussed a case study and important actions which become necessary in case of network intrusion. If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192.168.2.124 and
2 pages (500 words) Essay
IDS policy
For this to be beneficial, those workers must be capable to share the data each person enters. As a result, networking computers becomes essential. Networks are merely a group of computers linked by cable
2 pages (500 words) Essay
STATEGIC BUSINESS
Another important topic which has been discussed is the Identity Detection System (IDS), its advantages, disadvantages, deficiencies and
28 pages (7000 words) Essay
Intrusion Prevention and Detection: Securing Information
To cut the price of ownership, Symantec Host IDS is integrated with the Symantec Security Management System, which is an administration structure that offers
2 pages (500 words) Essay
Advantages and dis-advantages of IPS/IDS
The present study focuses on the advantages and disadvantages of IPS/IDS. Although snort performs detection and prevention of abnormal activities within a system, yet the benefits of Cisco IDS/IPS are more. This is
2 pages (500 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT