IDS Alert - Essay Example

Only on StudentShare

Extract of sample
IDS Alert

If my computer pointer starts moving by itself then I will at once pull out the network cable (LAN) or phone line from my PC as it is the point through which any external source can enter my PC. Port 3389 is a remote desktop connection port in windows which is usually opened in many computers on network. (Denning, 1990) A hacker can exploit it using a remote desktop connection and could send malicious threats or Trojans to gain access to the computer from this port. Removing my PC from the network will help isolate it and stop transferring the threat or virus to other Computers on the network.
A well define thought and planning is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.
After the computer has been isolated the next step would be to detect and remove the threat using the appropriate Intrusion Detection Systems. Updated versions of spy ware and Antivirus software will be installed on the PC if the current versions could not detect the threat. ...
Download paper


In this era of technology, Computer systems are under attack from various sources and through different techniques. Different kinds of worms, viruses and Trojan horses are used to attack and to gain access to the computer networks. Basically the IDS help in recognizing and observing the intrusion attempts made by any internal or outside party into the organization's network…
Author : lpredovic

Related Essays

GAP Business Plan
15 pages (3765 words) Essay
Distributed and Parallel Systems
9 pages (2259 words) Term Paper
Identity Theft
10 pages (2510 words) Essay
IDS Policy
2 pages (502 words) Essay
Security Network Intrusion detection system (IDS)
2 pages (502 words) Essay
IDS policy
2 pages (502 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!