Got a tricky question? Receive an answer from students like you! Try us!

IDS Policy - Essay Example

Only on StudentShare
College
Essay
Miscellaneous
Pages 2 (502 words)

Summary

A well define thought and planning for Gem Infosys is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.

Extract of sample
IDS Policy

These systems could be any workstation, server or other network peripherals such as a router. The IDS system runs as a service or a process and has the ability to detect the network traffic on the host system. To save the system from past threats a "threat signature" database is present to make sure that the system is not vulnerable to those threats. Microsoft, Cisco and Tripwire etc. are some of the companies that deal in these IDS systems. (Spafford, Zamboni, 2000)
2. Network Based IDS: These are systems that confine and analyze packets on the wire. Network based IDS are used to protect the entire systems on the network unlike Host base IDS which are built for a single system. After confining the packets on the network they send it to the IDS console for inspection. Major vendors include Cisco and Symantec.
As Gem infosys is a small software company having just 10 PC's and a broadband connection should not face much difficulty with the IDS system. But sometimes IDS solutions can bring out bogus alarms that may result in incorrect distribution of information. Inadequate potential and bad configuration choices are the major factors for this kind of problem. On the other hand many products need to be kept updated and well managed to avoid problems such as well updated sensors.
Proc ...
Download paper
Not exactly what you need?

Related Essays

IDS Alert
If my computer pointer starts moving by itself then I will at once pull out the network cable (LAN) or phone line from my PC as it is the point through which any external source can enter my PC. Port 3389 is a remote desktop connection port in windows which is usually opened in many computers on network. (Denning, 1990) A hacker can exploit it using a remote desktop connection and could send malicious threats or Trojans to gain access to the computer from this port. Removing my PC from the network will help isolate it and stop transferring the threat or virus to other Computers on the network.…
2 pages (502 words)
Monetary Policy
The Federal Open Market Committee (FOMC) is group within the Fed that meets several times a year to adjust the interest rates. Lower interest rates will increase demand for products and can stimulate the economy. For example, a decrease in interest rates lowers the cost of borrowing which leads to an increase in investment spending. It also leads families to buy automobiles, houses, and durable goods (Federal Reserve Board).…
2 pages (502 words)
Policy Sciences
It was more often that the advisors did not have any 'consideration of intellectual underpinnings, honesty, cumulative knowledge or independent evaluations' of the political and social scenario. There were also no recordings of the decisions and the reasons for such decisions written down. Most of advises, according to DeLeon, remained 'particularistic, ad hoc exercises' taken up when something was needed by the prince or the monarch. Documenting the decisions and supporting ideas were done during the later half of the nineteenth century. Subsequent growth of the policy science was based on…
7 pages (1757 words)