IDS Alert - Essay Example

Only on StudentShare

Extract of sample
IDS Alert

If my computer pointer starts moving by itself then I will at once pull out the network cable (LAN) or phone line from my PC as it is the point through which any external source can enter my PC. Port 3389 is a remote desktop connection port in windows which is usually opened in many computers on network. (Denning, 1990) A hacker can exploit it using a remote desktop connection and could send malicious threats or Trojans to gain access to the computer from this port. Removing my PC from the network will help isolate it and stop transferring the threat or virus to other Computers on the network.
A well define thought and planning is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.
After the computer has been isolated the next step would be to detect and remove the threat using the appropriate Intrusion Detection Systems. Updated versions of spy ware and Antivirus software will be installed on the PC if the current versions could not detect the threat. ...
Download paper


In this era of technology, Computer systems are under attack from various sources and through different techniques. Different kinds of worms, viruses and Trojan horses are used to attack and to gain access to the computer networks. Basically the IDS help in recognizing and observing the intrusion attempts made by any internal or outside party into the organization's network…
Author : lpredovic

Related Essays

GAP Business Plan
SMA_RT operates one step beyond security products designed to prevent access to intruders. Once the security is breached, an intruder can cause significant damage and huge financial loss in a very short period of time. The SMA_RT solution is to thwart the intruder before he has the opportunity to create havoc....
15 pages (3765 words) Essay
Distributed and Parallel Systems
A parallel system is a computer with more than one processor for parallel processing. Although there are many kinds of parallel computers, they are basically distinguished by the kind of interconnection between processor, known as processing elements (PES), and the memory. One major way to classify parallel computers is based on their memory architectures. Shared memory based parallel computing systems have multiple processors that access all available memory as a global address space. Distributed system is a network of a set of asynchronously connected computing devices. Communication in DS...
9 pages (2259 words) Term Paper
Identity Theft
Criminal identity theft, the most common non-financial type, occurs when someone gives another's personal information to a law enforcement officer when he or she is arrested. In addition to the financial losses resulting from identity theft, the person whose personal information has been used will have an erroneous credit or criminal history that is often expensive and time-consuming to correct. This type of identity fraud involves taking on someone else's identity in order to commit a crime, enter a country, get special permits, hide one's own identity, or commit acts of terrorism. These...
10 pages (2510 words) Essay
IDS Policy
These systems could be any workstation, server or other network peripherals such as a router. The IDS system runs as a service or a process and has the ability to detect the network traffic on the host system. To save the system from past threats a "threat signature" database is present to make sure that the system is not vulnerable to those threats. Microsoft, Cisco and Tripwire etc. are some of the companies that deal in these IDS systems. (Spafford, Zamboni, 2000)...
2 pages (502 words) Essay
Security Network Intrusion detection system (IDS)
1) The first and foremost thing is to have a grip upon the mental approach. I would try to stay composed and relaxed rather than getting panicked. I would analyze the whole situation cool mind. Whenever a network is established, problems like these are likely to occur and companies always have a well organized solution for this. So, there is no need to get horrified....
2 pages (502 words) Essay
IDS policy
Also, there are different evils associated to these network structures. For instance, personal information theft, business information hacking and virus attacks are the contemporary issues businesses are facing nowadays in the network communication and data transfer areas (Frederick, 2002). Furthermore, because of the increasing amount of intrusions the local networks and Internet have turned out to be uncertain, therefore, businesses more and more applying a variety of systems that monitor information technology security breaches (Sans, 2009)....
2 pages (502 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!