StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Firewalls and Intrusion Detection Systems - Assignment Example

Cite this document
Summary
With an increase in the indulgence in IT systems, security hitches have increased. For instance, hacking cases have increased significantly. For this reason,…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Firewalls and Intrusion Detection Systems
Read Text Preview

Extract of sample "Firewalls and Intrusion Detection Systems"

Firewalls and intrusion detection systems affiliation Firewalls and intrusion detection systems The modern IT systems require effective protection system that may prevent distortion and poor security measures. With an increase in the indulgence in IT systems, security hitches have increased. For instance, hacking cases have increased significantly. For this reason, security measures and systems have been developed to ensure IT systems are secured. St. Louis IT Company (2014) is of the assumption that security systems have become a mandatory requirement considering the vulnerable nature of IT systems.

In an example, Firewalls and intrusion detection systems are created to address network security cases. What are the similarities and differences of these two systems? Intrusion detection systems are software applications or devices that detects and monitors malicious activities of violations of policies provided. In addition, the application provides reports and information to management stations. The application has different ways and mechanisms that may detect network traffic from different sources.

In general, intrusion detection systems focus on detecting network incidences, logging information of users and reporting log in attempts (Ross, 2001). Moreover, companies use the systems to monitor their existing security systems. This is done by detecting issues with security policies and creating documentation on existing network issues. In addition, the system may provide recommendations on how to update existing security policies. The main objectives of IDS are analyzing and monitoring system activities and users, taking part in system audits, analyzing the safety of content used and required, detecting unusual activities and comparing partners to malware patterns.

One major weakness of the system is that it must contain human operations which may hinder the effectiveness of automated functionality (Verma, 2008). On the other hand, firewalls are also used to increase the effectiveness of network security approaches. Firewall protects network security systems from access from unauthorized sources. Verma (2008) is of the assumption that firewall protect security prior to their access. The author further points out that the security system relies on its ability to protect access and distortion before threat is launched.

To increase the effectiveness of the system, they are regularly updated to be able to identify advanced network threats. Firewall security systems also ensure the safety of the network connection used in a business. With a protected security firewall detects both incoming and outgoing packets. This ensures protection from both internal and external risks. One the hardware and software are installed, firewall can function as automated systems (Ross, 2001). The similarities between the two security systems are that they are enabled to detect security threats from networks and users.

In addition, they can both be created to fit a pattern or specifications required by a person of a business. For instance, one may block the access to specific websites to minimize security threats that may emanate from the site. The main difference between firewall and intrusion detection system is that firewall protect security threats that may originate outwardly (St. Louis IT Company, 2014). It protects a system before the threat happens. However, IDS are not equipped with this form of detection.

They detect an already existing network security threat (Internet-Computer-Security, 2011). ReferencesInternet-Computer-Security. (2011). IPS (Intrusion Prevention System) and IDS (Intrusion Detection Systems). Retrieved from http://www.internet-computer-security.com/Firewall/IPS.htmlRoss, A. (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. New York: John Wiley & sons. St. Louis IT Company. (2014). Intrusion Detection Systems & Firewall Configuration Services.

Retrieved from http://www.forwardslashtechnology.com/firewall-intrusion-detection-prevention.htmlVerma, M. (2008).Principles of Information Security. New York: Course Technology.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Firewalls and Intrusion Detection Systems Assignment”, n.d.)
Firewalls and Intrusion Detection Systems Assignment. Retrieved from https://studentshare.org/information-technology/1654587-firewalls-and-intrusion-detection-systems
(Firewalls and Intrusion Detection Systems Assignment)
Firewalls and Intrusion Detection Systems Assignment. https://studentshare.org/information-technology/1654587-firewalls-and-intrusion-detection-systems.
“Firewalls and Intrusion Detection Systems Assignment”, n.d. https://studentshare.org/information-technology/1654587-firewalls-and-intrusion-detection-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Firewalls and Intrusion Detection Systems

Internet and E-Business: Oxenford Business College

20) maintained that organizations engaged in e-commerce must develop a security policy that can be used as a tool to assist with the creation and implementation and configuration of technical tools such as Firewalls and Intrusion Detection Systems, among others.... Internet and E-Business: A Case Study for Oxenford Business College This report investigates how Oxenford Business College could take advantage of e-commerce in expanding their business....
5 Pages (1250 words) Assignment

Penetration Test for an Organization

The most commonly deployed security systems include anti-virus software, firewalls, and intrusion detection systems.... hellip; The rise in the demand for internet connectivity has also been closely observed by criminals who target network systems of organization.... The organizations and institutions are interested in securing their information systems in order to protect some of the vital information and contents that are restricted to non-executive members of the firm....
8 Pages (2000 words) Term Paper

Intrusion Detection System

shall review the firewall and intrusion detection system (IDS) logs because the intrusion might have been possible due to a trouble with these.... intrusion detection SystemIntroduction It is very important to keep track of all possible intrusions that a sensitive network might encounter (thesis statement).... This can be done by keeping a strict check on proper configuration, management and monitoring of the firewall settings, intrusion detection system's logs and anti-virus upgrades....
2 Pages (500 words) Assignment

Technology of Information Security

intrusion detection System (IDS)An intrusion detection system (IDS) is aimed at identifying applied or attempted intrusions into the network and carrying out appropriate operations for the intrusions.... Basically, the intrusion detection encompasses a wide variety of techniques that differ on several axes.... Management Information systems, Sixth Edition (6th ed.... Some of these axes include: discussed by (Silberschatz, Galvin, & Gagne, 2004)The time at which detection occurs: in real time (while it is taking place) or following the information only....
2 Pages (500 words) Essay

Modern Day Attacks against Firewalls and VPNs

This essay "Modern Day Attacks against firewalls and VPNs" intends to explain and discuss modern-day attacks against firewalls and VPNs.... nbsp;This essay intends to explain the modern-day attacks against firewalls and VPNs by explaining the concepts of these two information technology tools.... Firewalls are integrated security systems designed to secure networks from unauthorized access.... Firewalls can also be defined as security measures, which protect the local systems as well as network systems from potential threats....
8 Pages (2000 words) Essay

Security Options

In the paper “Security Options” the author analyzes the Computer Security concentration, which focuses on basic security matters that occur in the design, study, and execution of distributed systems.... This concentration offers in-detail coverage of the hypothesis and relevance of identity....
8 Pages (2000 words) Assignment

Personal Firewalls and Online Armor Personal Firewall Advantages and Disadvantages

The paper "Personal firewalls and Online Armor Personal Firewall Advantages and Disadvantages" is focused on a hardware, software, or a combination of both that is used to monitor and filter traffic going into or leaving a protected or private network, and prevent unauthorized entry into network.... The bastion host is a computer on the network of the organization that has the bare minimum and essential services, which is set up to withstand all kinds of network intrusion attacks....
9 Pages (2250 words) Literature review

Cyber Security and Digital Forensics

The premise of this argument is that reliance on passive antimalware and antivirus software has created a false sense of security for businesses leaving them vulnerable to serious attacks since they fail to actively monitor their systems.... This paper "Cyber Security and Digital Forensics" argues that many businesses are unaware of attacks and have slow responses to these risks that endanger the security of the entire organization....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us