IDS Policy - Essay Example

Only on StudentShare

Extract of sample
IDS Policy

These systems could be any workstation, server or other network peripherals such as a router. The IDS system runs as a service or a process and has the ability to detect the network traffic on the host system. To save the system from past threats a "threat signature" database is present to make sure that the system is not vulnerable to those threats. Microsoft, Cisco and Tripwire etc. are some of the companies that deal in these IDS systems. (Spafford, Zamboni, 2000)
2. Network Based IDS: These are systems that confine and analyze packets on the wire. Network based IDS are used to protect the entire systems on the network unlike Host base IDS which are built for a single system. After confining the packets on the network they send it to the IDS console for inspection. Major vendors include Cisco and Symantec.
As Gem infosys is a small software company having just 10 PC's and a broadband connection should not face much difficulty with the IDS system. But sometimes IDS solutions can bring out bogus alarms that may result in incorrect distribution of information. Inadequate potential and bad configuration choices are the major factors for this kind of problem. On the other hand many products need to be kept updated and well managed to avoid problems such as well updated sensors.
Proc ...Show more

Summary

A well define thought and planning for Gem Infosys is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.
Author : ratkejoanny
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"IDS Policy"
with a personal 20% discount.
Grab the best paper

Related Essays

IDS Alert
These systems are made to spot the threats and then take suitable measure to remove them. If I get a message alert from my IDS that someone is trying to connect to my PC through the port 3389 then my first response would be to stop that access as soon as possible.
2 pages (500 words) Essay
Monetary Policy
Without a sound monetary policy, our economy would spin out of control. The policies that are conducted by the Federal Reserve Board (The Fed) are the are some of the most influential factors that affects our economic livelihood. Monetary policy attempts to influence demand for products by increasing and decreasing short term interest rates charged to banks for Federal Funds.
2 pages (500 words) Essay
Policy Sciences
Major changes in the thought process of the policy sciences happened immediately after World War II. In the pre-World War II work, the political advisors were different for different monarchs. Hardly ever the political advisors continued to provide service to two or more monarchs who succeeded the first.
7 pages (1750 words) Essay
The point of making people and organizations more accountable
The point of making people and organizations more accountable, is therefore, expected. The reasons are the concern of this paper, and they are slowly introduced as the discussion unfolds. Transparency as well as promises and performance are inherently related to accountability (Newell & Wheeler, 2006b).
6 pages (1500 words) Essay
Security Network Intrusion detection system (IDS)
Below is discussed a case study and important actions which become necessary in case of network intrusion. If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192.168.2.124 and
2 pages (500 words) Essay
IDS policy
For this to be beneficial, those workers must be capable to share the data each person enters. As a result, networking computers becomes essential. Networks are merely a group of computers linked by cable
2 pages (500 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT