StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Intrusion Detection System - Assignment Example

Cite this document
Summary
According to the report, I shall isolate the affected computer within no time so as to protect the other computers on the network. First, I shall unplug the network cable and then physically disconnect the victim computer from the network which will block the attacker from gaining…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Intrusion Detection System
Read Text Preview

Extract of sample "Intrusion Detection System"

Intrusion Detection SystemIntroduction It is very important to keep track of all possible intrusions that a sensitive network might encounter (thesis statement). This can be done by keeping a strict check on proper configuration, management and monitoring of the firewall settings, intrusion detection system’s logs and anti-virus upgrades. A case study has been discussed here which involves a scenario where an intruder attacked port 3389 of a computer.Necessary Actions According to the case study given, the intrusion will drive me to take these actions: I shall tell myself to relax.

Fright worsens the whole situation. One can think better with a composed mind. I shall take a deep breath instead of getting frightened, and then shall look into the matter deeply as to how the problem arose and what to do next. I shall isolate the affected computer within no time so as to protect the other computers on the network. First, I shall unplug the network cable and then physically disconnect the victim computer from the network which will block the attacker from gaining further access to the computer as well as from infecting other computers on the network.

I shall change the subnet mask on the attacked port or try creating a VLAN, and if the network router is not capable of creating VLANs, then I could use another router “by using the wan port as the connection” to the original router (Techie, 2009). After getting the system disconnected both from the internet and the network, I shall think about doing a proper action with the attacked port 3389. Because the intruder infected the port 3389, it would be necessary to block it, and open it only for local functions with the co-computers.

I shall look for any important network passwords that might have been saved on the computer. I shall find out if there was any sensitive information saved, such as, any credit card details and if yes, then the credit card company has to be notified immediately. I shall ask myself when the first time I caught something was going wrong which I had not considered important at that time. Other enquiries that will be necessary are that- whether the anti-virus software installed had been updated or contained non-updated virus definitions.

I shall find out if upgrades had been installed and were operational. It will also be important to investigate whether VPN had been established to protect the network from getting intruded and to reduce the security breach. I shall make arrangements for the continuity of network operations like preparing redundant system and obtaining data back-ups (State of California, 2009).I shall immediately inform the system administrator and all the concerned authorities that are associated with the sensitive information saved on the affected computer, such as, the credit card company as stated above.

I shall review the firewall and intrusion detection system (IDS) logs because the intrusion might have been possible due to a trouble with these. I shall review all routers and DNS servers to make sure that firewall settings have been applied to the whole network. It is also important to find out if the firewalls and IDS had been properly configured and implemented as there might have been a problem with proper configuration of firewalls due to which these could not block the intrusion. I shall scan the firewall through a vulnerability scanner to make sure that it only allows the pre-defined and requisite actions and services to pass through.

SummaryPutting everything together, I shall do all what I can to make sure that such an intrusion never occurs again and shall carry out necessary investigations about the firewall and IDS logs and settings to make the network secure from all non-trusted sources.ReferencesState of California. (2009). Computer crime reporting- summary of incident do’s and don’ts. The California Highway Patrol. Retrieved from http://www.chp.ca.gov/programs/ccrime-incident.htmlTechie, J. (2009). How to isolate computer from others on network.

Let’s Tech Talk. Retrieved from http://www.tech-forums.net/pc/f44/how-isolate-computer-others-network-206335.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Intrusion Detection System Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1560454-risk-management
(Intrusion Detection System Assignment Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1560454-risk-management.
“Intrusion Detection System Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1560454-risk-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Intrusion Detection System

An Open Source Network Intrusion Detection System

This paper ''an Open Source Network Intrusion Detection System'' discusses the Snort as an open source network Intrusion Detection System (NIDS) that is noted for its effectiveness.... However, as the tool matures, it was transformed as an Intrusion Detection System.... It is defined as “An open source network Intrusion Detection System (NIDS) that is noted for its effectiveness.... However, as the tool matures, it was transformed as an Intrusion Detection System....
2 Pages (500 words) Article

Network Intrusion Detection Systems

Intrusion Detection System detects and protects the network system from threats and attacks.... It is mandatory for the network systems to install an Intrusion Detection System to easily manage the attacks and resolve the issues.... According to Mun the Intrusion Detection System works well only if the system is selected based on the type of network.... The Intrusion Detection System must be selected to suit the network.... Network intrusion detection systems are widely used and they are one of the major component in a network....
5 Pages (1250 words) Essay

Intrusion detection systems

IDS is the short form for the intrusion detection Systems.... IDS is the short form for the intrusion detection Systems.... These systems basically find out the manner in which unwanted signals towards the systems are manipulated.... In fact there are a host of different kinds that come under the IDS heading… Moreover,coming to the point of these manipulations which occur in the first place,we discern that these are the usual attacks that are carried out by the hackers who are skilled and quite adept at their work and even at times,script kiddies do play these tricks whereby they make use of the automated scripts to achieve their objectives....
8 Pages (2000 words) Essay

An improvement of Intrusion Detection System using HCI

People use Intrusion Detection System (IDS) applications as assistant tools to detect illegal activities that will cause damage to their computer systems or networks.... IDS users can be categorized from two perspectives: (1) their knowledge about network/system security management; and (2) the time and effort that they could put into intrusion detection.... Network/system specialists and administrators mostly know more about computer networks and systems than regular computer system owners....
14 Pages (3500 words) Essay

Security Network Intrusion detection system (IDS)

A network Intrusion Detection System (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP… Below is discussed a case study and important actions which become necessary in case of network intrusion. If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192.... 24 and Network Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network's security....
2 Pages (500 words) Essay

A Network Intrusion Detection System and Security Attacks

The paper "A Network Intrusion Detection System and Security Attacks" gives detailed information about the mark IDS technique, a system based interruption recognition framework.... A Network Intrusion Detection System monitors networks for intrusions and attacks reporting any anomalies to the administrator.... hellip; intrusion detection has become an important sector.... intrusion detection systems (IDS) can effectively provide network security by preventing, detecting, and possibly fighting attacks....
7 Pages (1750 words) Assignment

Purpose of Intrusion Detection and Detection Techniques

According to Sundaram (1996) “an automatic intrusion detection that performs automated intrusion detection is acknowledged as an IDS or Intrusion Detection System” (Sundaram, 1996).... An Intrusion Detection System can be either network-based, in the host-based it checks system logs or calls, or network-based if it observes network packets flow during the commutation.... urpose of IDSs and Detection TechniquesAccording to Bradley (2009), an Intrusion Detection System is an application or device utilized to scrutinize the entire network traffic as well as alert the administrator or user when there has been an illegal effort or access....
5 Pages (1250 words) Coursework

A Network-Based Intrusion Detection System for ACME Software Solutions

… The paper “A Network-Based Intrusion Detection System for ACME Software Solutions” is a motivating variant of a lab report on information technology.... The paper “A Network-Based Intrusion Detection System for ACME Software Solutions” is a motivating variant of a lab report on information technology.... The networks main element will encompass the following: Firewall; NIDS (Network-based Intrusion Detection System); Web Server; Database Server; and installation....
13 Pages (3250 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us