StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

State-Based Network Intrusion Detection System - Assignment Example

Cite this document
Summary
The paper "State-Based Network Intrusion Detection System" is a good example of a finance and accounting assignment. Conventionally, to secure computer systems, programmers resorted to the creation of a protective “shield” – so to speak – around these systems by way of design security mechanisms such as firewalls (see Lodin & Schuba), authentication mechanisms, Virtual Private Networks (VPN)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful

Extract of sample "State-Based Network Intrusion Detection System"

Download file to see previous pages

The paper "State-Based Network Intrusion Detection System" is a good example of a finance and accounting assignment. Conventionally, to secure computer systems, programmers resorted to the creation of a protective “shield” – so to speak – around these systems by way of design security mechanisms such as firewalls (see Lodin & Schuba), authentication mechanisms, Virtual Private Networks (VPN). However, these security mechanisms almost have inevitable vulnerabilities and they are usually not sufficient to ensure complete security of the infrastructure and to ward off attacks that are continually being adapted to exploit the system’s weaknesses often caused by careless design and implementation flaws. This accounts for the need for security technology that can monitor systems and identify computer attacks. This is called intrusion detection and is complementing conventional security mechanisms (Kumar, Srivastava & Lazarevic, 20).

 

To better understand Network Intrusion Detection System (NIDS), we first need to clarify its element terminologies. Firstly, an intrusion is an attempt to break into or misuse one’s system. An intruder is more commonly known as a hacker – a generic term for a person who likes getting into things, with a benign hacker who likes to get into his/her own computer and understands how it works and a malicious hacker who likes getting into other people’s systems -- or cracker (a term that benign hackers would like to be applied to them). Now, intruders may be outsiders. That is, they may attack your network from outside – e.g., defacing the web servers, forwarding spasm through e-mail servers, etc. – or may try to skirt around the security mechanisms used – such as firewalls -- to assail machines on the internal network. Intruders from the outside (of the network) may proceed from the dial-up Internet lines, or maybe a result of physical break-ins, and/or maybe by one’s partner (vendor, customer, reseller, etc.) network that is linked to one’s corporate network. Intruders may likewise be internal – i.e., intruders that may legitimately use one’s internal network, including users who misuse privileges (for example, an election officer who marked someone in the list of the voters as being dead for a political reason) or who impersonate higher privileged users (by using someone else’s terminal).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(State-Based Network Intrusion Detection System Assignment Example | Topics and Well Written Essays - 12250 words, n.d.)
State-Based Network Intrusion Detection System Assignment Example | Topics and Well Written Essays - 12250 words. https://studentshare.org/finance-accounting/2032205-state-based-network-intrusion-detection-system-computing
(State-Based Network Intrusion Detection System Assignment Example | Topics and Well Written Essays - 12250 Words)
State-Based Network Intrusion Detection System Assignment Example | Topics and Well Written Essays - 12250 Words. https://studentshare.org/finance-accounting/2032205-state-based-network-intrusion-detection-system-computing.
“State-Based Network Intrusion Detection System Assignment Example | Topics and Well Written Essays - 12250 Words”. https://studentshare.org/finance-accounting/2032205-state-based-network-intrusion-detection-system-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF State-Based Network Intrusion Detection System

Biometric Security: Biometric Benefits and Problems

15 Pages (3750 words) Assignment

Advertisement Management Project - Media Plus

The success of the second stage of the campaign hinges on how wide is the network of businesses that the first stage will be able to convince to have their business information included in the Gulf Business Directory.... … Media Plus, W.... .... Gulf Business Directory ProjectCAMPAIGN REPORTIntroductionMedia Plus, W....
15 Pages (3750 words) Coursework

Information Security at OSL Layers and Cloud Computing

t is this particular scenario that has made security, between sites, system, and applications, a major consideration and expense for any modern organization.... The ubiquitous nature of computer network connectivity may aid computer users in accessing the world, while at the same time it may enable the same world to access those same computer systems in an undesirable manner.... The ubiquitous nature of computer network connectivity may aid computer users in accessing the world, while at the same time it may enable the same world to access those same computer systems in an undesirable manner....
19 Pages (4750 words) Assignment

Analysis of Domain Name Theory - VeriSign Inc

The company operates a wide range of network infrastructure such as .... … The paper "Analysis of Domain Name Theory - VeriSign Inc" is a perfect example of a business case study.... Domain Name Industries such as VeriSign Inc.... are an important constituent of any country....
7 Pages (1750 words) Case Study

Prestine Shine Detailing Service

This problem exists in the company probably because of poor data backup system.... This issue has arisen despite the project's assumption that there is an effective data backup, security and privacy system put in place.... … The paper "Prestine Shine Detailing Service " is a perfect example of a business case study....
11 Pages (2750 words) Case Study

Non-Governmental Organization - the United States Agency for International Development

… The paper 'Non-Governmental Organization - the United States Agency for International Development " is a good example of a management case study.... Non-governmental organizations (NGOs) focusing on the development have increased their profiles at local and international levels for the last twenty years....
13 Pages (3250 words) Case Study

Non-Government Sector in Australia

… The paper "Non-Government Sector in Australia" is a great example of a report on management.... The Australian government has a history of providing services to the public through other sectors.... Like the majority of developed countries, this aspect of devolved government has significantly gained complexity, scale, and scope....
15 Pages (3750 words)
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us