High school
Essay
Miscellaneous
Pages 2 (502 words)
Download 0
In this era of technology, Computer systems are under attack from various sources and through different techniques. Different kinds of worms, viruses and Trojan horses are used to attack and to gain access to the computer networks. Basically the IDS help in recognizing and observing the intrusion attempts made by any internal or outside party into the organization's network…

Introduction

If my computer pointer starts moving by itself then I will at once pull out the network cable (LAN) or phone line from my PC as it is the point through which any external source can enter my PC. Port 3389 is a remote desktop connection port in windows which is usually opened in many computers on network. (Denning, 1990) A hacker can exploit it using a remote desktop connection and could send malicious threats or Trojans to gain access to the computer from this port. Removing my PC from the network will help isolate it and stop transferring the threat or virus to other Computers on the network.
A well define thought and planning is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.
After the computer has been isolated the next step would be to detect and remove the threat using the appropriate Intrusion Detection Systems. Updated versions of spy ware and Antivirus software will be installed on the PC if the current versions could not detect the threat. ...
Download paper
Not exactly what you need?

Related papers

Audit and Internal Control
A computer system is at risk of been accessed illegally and data that is held there within put at risk.…
GAP Business Plan
SMA_RT operates one step beyond security products designed to prevent access to intruders. Once the security is breached, an intruder can cause significant damage and huge financial loss in a very short period of time. The SMA_RT solution is to thwart the intruder before he has the opportunity to create havoc.…
IDS Alert
If my computer pointer starts moving by itself then I will at once pull out the network cable (LAN) or phone line from my PC as it is the point through which any external source can enter my PC. Port 3389 is a remote desktop connection port in windows which is usually opened in many computers on network. (Denning, 1990) A hacker can exploit it using a remote desktop connection and could send…
Distributed and Parallel Systems
A parallel system is a computer with more than one processor for parallel processing. Although there are many kinds of parallel computers, they are basically distinguished by the kind of interconnection between processor, known as processing elements (PES), and the memory. One major way to classify parallel computers is based on their memory architectures. Shared memory based parallel computing…
identity theft purely american or international
Criminal identity theft, the most common non-financial type, occurs when someone gives another's personal information to a law enforcement officer when he or she is arrested. In addition to the financial losses resulting from identity theft, the person whose personal information has been used will have an erroneous credit or criminal history that is often expensive and time-consuming to correct.…
IDS Policy
These systems could be any workstation, server or other network peripherals such as a router. The IDS system runs as a service or a process and has the ability to detect the network traffic on the host system. To save the system from past threats a "threat signature" database is present to make sure that the system is not vulnerable to those threats. Microsoft, Cisco and Tripwire etc. are some of…
Detecting rogue access point using Omnipeek software to analyze the wireless network
According to peter and scarfone (2007), the TCP/IP layer provides network communication and is made up of four main layers. These are the …