StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Intrusion Prevention - Essay Example

Cite this document
Summary
Intrusion Prevention [University] [Instructor Name] Intrusion Prevention Introduction Hacker is a word used to refer to those individuals who have a habit and an obsession to manipulate the hardware and software sectors of a system to make it work more efficient and effectively…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Intrusion Prevention
Read Text Preview

Extract of sample "Intrusion Prevention"

Download file to see previous pages

When the term hacker came into existence and the way media portrayed a hacker’s image, many individuals who thought that the media’s definition of hacking is cool and trendy, started using their abilities in illegal ways. Later on when companies and individual started facing issues caused due to the hackers who were a part of the dark side of hacking, many individuals who were previously involved in illegal and unethical hacking started providing services as ethical hackers. Their task was to identify various security vulnerabilities that could be manipulated by illegal hackers and they even started providing solutions for these security concerns.

This method of solving security issues have existed over a very long period of time, this method has ended up being one of the best ways to solve a user’s security issues but on the other hand users are even concerned about the legitimacy of such security providers. Body There are several advantages associated with hiring hackers for the protection of user’s system, these hackers might have previously indulged in activities recognized as unethical hacking, but today, they are using their expertise for legitimate purposes.

A hacker is beneficial for securing computer systems because they have been a part of the hacking business and thus their expertise of hacking are much more advanced than those who haven’t been a part of the illegal hacking side. Individuals can learn the basic concepts and technicalities of hacking from various resources but they cannot develop their own techniques nor can they have experience of all the techniques available. Only a genuine hacker has these capabilities and he/she uses various techniques together or in isolation for hacking purposes.

Hackers who are involved in the legitimate business of providing security through their hacking skills are recognized as White hat hackers; they keep themselves updated with day to day threats and treat this as their full time job (Teare, 2006, p.104). Thus they own the appropriate amount of skills, abilities, and knowledge required to conduct legal hacking. Hiring a hacker for security purposes can obviously have various negative consequences. Trust is a major factor that comes into scrutiny when a hacker is hired to secure a premise.

This is similar to hiring a convicted burglar for the security of your own home. The most important aspect of any business is the customer and other stakeholders of the business. Attaching a negative element to a business such as hiring a convicted hacker for security purposes may ruin the image of the business and the concerns of the stakeholders are destined to increase. One of the major concerns of hiring a white hat hacker, who previously used to be a black hat hacker, is the issue of privacy of personal information of the customers and the suppliers (Wilhelm, 2010, p.15). If by mistake a company hires a black hat security consul

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Intrusion Prevention Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Intrusion Prevention Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1454457-information-flows-and-financial-management
(Intrusion Prevention Essay Example | Topics and Well Written Essays - 750 Words)
Intrusion Prevention Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1454457-information-flows-and-financial-management.
“Intrusion Prevention Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1454457-information-flows-and-financial-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Intrusion Prevention

An Evaluation of Wireless Intrusion Prevention and Protecting Insecure Channels

In the past few years, wireless networks have caught the attention of the majority of business organizations as well as individuals.... At the present, the trend of wireless networks has become very common.... hellip; In the past few years, wireless networks have caught the attention of the majority of business organizations as well as individuals....
30 Pages (7500 words) Research Paper

Technology Evaluation and Recommendation

As Scarfone and Mell (2007) describe, Intrusion Prevention systems (IPS) are network security tools that continuously monitor the company network and system activities to detect malicious activities; and Intrusion Prevention systems are classified into four different types such as network-based Intrusion Prevention systems (NIPS), wireless Intrusion Prevention systems (WIPS), network behavior analysis (NBA), and host-based Intrusion Prevention systems (HIPS)....
3 Pages (750 words) Essay

The Future of Intrusion Prevention

A threat assessment methodology will provide the means to analyse and understand the threat agents in order to anticipate their moves and ways of engagement.... Until now, threat assessment was just a part of risk analysis.... Risk analysis is a process to assist management in defining where time and money should be spent (Nosworthy, 2000)....
8 Pages (2000 words) Essay

Intrusion Prevention and Detection: Securing Information

(Please comment also on the effectiveness of the demo itself)Symantec Host Intrusion Detection and prevention Solutionhttp://www.... It presents innovative procedure for management of capabilities that jointly offer an efficient and non-intrusive prevention solution to prevent threats like that buffer overflow attacks as well as Trojan horse attacks.... ummary and conclusions from a user and organizational level In this overall analysis I have analyzed that Symantec Host Intrusion Detection and prevention Solution is the most effective solution for the management and handing of small to large business platforms....
2 Pages (500 words) Essay

Security Technology Firewalls and VPN

In organization, like banks, they tend to make use of computer technology to try and improve areas that might need a lot of work.... They therefore try and make their system secure so that… This paper discusses security technology, firewalls and VPNs that can be used to make our system secure. Stewart (233) defines a firewall as a written program and a vital network component that screens the movement of information through a In my research, i came about Comodo internet security, pc tools firewall plus free edition and zonealarm free firewall that are the best firewalls to be used at present because they are very light, cheap, easy to maintain as some of them like comodo has combined its antivirus program with firewall pro hence free security program for everyone....
3 Pages (750 words) Coursework

Company's Security on the Internet

The study "Company's Security on the Internet" concludes that the organization made multiple modifications within the security features of its networks for attaining the trust and the preference of its business partners, and took measures to prevent any possible attacks from unauthorized sources....
16 Pages (4000 words) Case Study

The Risk Analysis and Threat Assessment

The paper 'The Risk Analysis and Threat Assessment' presents a threat assessment methodology that will provide the means to analyze and understand the threat agents in order to anticipate their moves and ways of engagement.... Until now, threat assessment was just a part of risk analysis.... hellip; Risk analysis is a process to assist management in defining where time and money should be spent....
8 Pages (2000 words) Term Paper

Designing Networks in Waxlow Private School

This paper, Designing Networks in Waxlow Private School, declares that the Internet is the fastest rising technology and has produced endless opportunities.... At the same time serving students to navigate through the dominant and greatest growing world of information is a challenge.... nbsp;… As the paper highlights, the campus area network connects with two or more networks of the educational institutes, universities or corporate campus....
28 Pages (7000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us