College
Essay
Miscellaneous
Pages 2 (502 words)
Download 0
A well define thought and planning for Gem Infosys is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.

Introduction

These systems could be any workstation, server or other network peripherals such as a router. The IDS system runs as a service or a process and has the ability to detect the network traffic on the host system. To save the system from past threats a "threat signature" database is present to make sure that the system is not vulnerable to those threats. Microsoft, Cisco and Tripwire etc. are some of the companies that deal in these IDS systems. (Spafford, Zamboni, 2000)
2. Network Based IDS: These are systems that confine and analyze packets on the wire. Network based IDS are used to protect the entire systems on the network unlike Host base IDS which are built for a single system. After confining the packets on the network they send it to the IDS console for inspection. Major vendors include Cisco and Symantec.
As Gem infosys is a small software company having just 10 PC's and a broadband connection should not face much difficulty with the IDS system. But sometimes IDS solutions can bring out bogus alarms that may result in incorrect distribution of information. Inadequate potential and bad configuration choices are the major factors for this kind of problem. On the other hand many products need to be kept updated and well managed to avoid problems such as well updated sensors.
Proc ...
Download paper
Not exactly what you need?

Related papers

Does the Christan salvesen's sickness absence management policy meet its obligations under the DDA'
The inter-war years were tough but Salvesen sold a large number of ships and rode out the difficult period. When the post-war whaling boom ended, Salvesen scaled down its involvement and ended its interest.…
Immigration Policy
This paper seeks to analyze the changes in immigration policy in the lights of broad and diverse academic resources.…
IDS Alert
If my computer pointer starts moving by itself then I will at once pull out the network cable (LAN) or phone line from my PC as it is the point through which any external source can enter my PC. Port 3389 is a remote desktop connection port in windows which is usually opened in many computers on network. (Denning, 1990) A hacker can exploit it using a remote desktop connection and could send…
Monetary Policy
The Federal Open Market Committee (FOMC) is group within the Fed that meets several times a year to adjust the interest rates. Lower interest rates will increase demand for products and can stimulate the economy. For example, a decrease in interest rates lowers the cost of borrowing which leads to an increase in investment spending. It also leads families to buy automobiles, houses, and durable…
IDS Policy
These systems could be any workstation, server or other network peripherals such as a router. The IDS system runs as a service or a process and has the ability to detect the network traffic on the host system. To save the system from past threats a "threat signature" database is present to make sure that the system is not vulnerable to those threats. Microsoft, Cisco and Tripwire etc. are some of…
Policy Sciences
It was more often that the advisors did not have any 'consideration of intellectual underpinnings, honesty, cumulative knowledge or independent evaluations' of the political and social scenario. There were also no recordings of the decisions and the reasons for such decisions written down. Most of advises, according to DeLeon, remained 'particularistic, ad hoc exercises' taken up when something…
The point of making people and organizations more accountable
This is because there are the stakeholders who need current information on the status of their concerns. For example, in an international session that looked at accountability across all sectors involved in HIV, including community, government and UN, a reporter reported that -…