StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Intrusion Prevention System - Assignment Example

Cite this document
Summary
The paper "Intrusion Prevention System" is an outstanding example of an assignment on information technology. In my opinion, the argument presented in response to the failure of the firewall to prevent intrusion is plausible; since the firewall cannot protect a whole network from intrusion by all forms of intrusion…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful

Extract of sample "Intrusion Prevention System"

The paper "Intrusion Prevention System" is an outstanding example of an assignment on information technology. In my opinion, the argument presented in response to the failure of the firewall to prevent intrusion is plausible; since the firewall cannot protect a whole network from intrusion by all forms of intrusion. While it can help in preventing the intrusion of the local networks by internet attacks, it might not be able to prevent internal intrusion. Therefore, the dependency on the firewall alone is not sufficient security measure, since it leaves the internal intrusion uncovered, which is another intrusion threat. Additionally, I agree that D&A Company ought to have applied an Intrusion Prevention System since it would have helped to detect any anomaly or alteration in the performance of the company’s network, and thus help to detect the intrusion by Billy since his activities on the network would have been detected as an anomaly. 

Response to Second question and answer
In concurring with the response to this question, Honey pots are used as a side trap for tracking hackers and other intruders into a network system. However, depending on how honey pots are used, they might end-up being discovered by the intruders as only traps, more so if they are not developed in a manner that makes them appear like genuine networks. Therefore, the efficiency and effectiveness of honey ports depend on the ability to develop them and locate them at the most appropriate locations in the networks, where the hackers and intruders cannot easily discover them as traps. Thus, in agreement with the answer to this question, adequate resources, manpower as well as proper planning and timing on the honey pots placement is essential, to make them effective network security tools. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Intrusion Prevention System Assignment Example | Topics and Well Written Essays - 283 words, n.d.)
Intrusion Prevention System Assignment Example | Topics and Well Written Essays - 283 words. https://studentshare.org/information-technology/1885962-cybersecurity
(Intrusion Prevention System Assignment Example | Topics and Well Written Essays - 283 Words)
Intrusion Prevention System Assignment Example | Topics and Well Written Essays - 283 Words. https://studentshare.org/information-technology/1885962-cybersecurity.
“Intrusion Prevention System Assignment Example | Topics and Well Written Essays - 283 Words”. https://studentshare.org/information-technology/1885962-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Intrusion Prevention System

Biometric Security: Biometric Benefits and Problems

The possibility of an attack on the system to steal the captured data and use it to access that person's account is a big concern.... Standard biometric testing and procedures are critical since they will provide people with much better perception of the biometric system and help them pick the own preference (Kang and Weimin, 2002, p.... This means the less accurate the configuration, the more likely the system identifies somebody else (p.... … Word Count: Analysis 1- 1,122 Analysis 2- 1, 114 Analysis 3- 1, 172TABLE OF CONTENTSAnalysis 1 – Biometric Security: Biometric Benefits and Problems-3References-7Appendix-7Analysis 2 – Internet Security Analysis: SPAM prevention and Word Count: Analysis 1- 1,122 Analysis 2- 1, 114 Analysis 3- 1, 172TABLE OF CONTENTSAnalysis 1 – Biometric Security: Biometric Benefits and Problems-3References-7Appendix-7Analysis 2 – Internet Security Analysis: SPAM prevention and Technique-8Fighting SPAM with ISP-8Website Level Protection-9Individual Protection and Technique-10SPAM Protection in Development-10References-12Appendix-12Analysis 3 – Network Security: Security Implications of Honeypots-13Physical and Virtual Honeypot-13Types of Data Capture-14Importance of Data Analysis-15Other Views and Possibilities-15References-18Appendix-181....
15 Pages (3750 words) Assignment

State-Based Network Intrusion Detection System

However, these security mechanisms almost have inevitable vulnerabilities and they are usually not sufficient to ensure complete security of the infrastructure and to ward off attacks that are continually being adapted to exploit the system's weaknesses often caused by careless design and implementation flaws.... o better understand Network Intrusion Detection system (NIDS), we first need to clarify its element terminologies.... Firstly, an intrusion is an attempt to break into or misuse one's system....
49 Pages (12250 words) Assignment

How the Global System for Mobile Communication Security Systems Will Work

… Closed-circuit televisions:10How the Closed-circuit television cameras will be working;11Advantages of using the Closed-circuit television:11Global system for Mobile communication security systems:12How the Global system for Mobile communication Closed-circuit televisions:10How the Closed-circuit television cameras will be working;11Advantages of using the Closed-circuit television:11Global system for Mobile communication security systems:12How the Global system for Mobile communication security systems will work:12Conclusion:13Introduction:An intrusion detection system is supposed to detect the intrusion by any unauthorized person to a given facility....
10 Pages (2500 words) Assignment

Financial Statement Fraud: Motives, Methods, Cases and Detection

Financial statement fraud is very costly yet the most common type of fraud committed in companies which has led to concerns and shaken confidence in the financial reporting system and capital markets (Albrecht et al.... … 1.... IntroductionThe highly competitive business environment in the global market has contributed to some corporate executives involving in financial statement fraud in order to redeem the face of the organization before potential investors, and 1....
10 Pages (2500 words) Assignment

Fraud Examination in Australia

omputer system can undergo infection and damage without the knowledge of the owner.... … IntroductionThirst for money has lead to stealing in many organizations.... Practice of illegally having confidential information concerning finance in any organization remains an act of fraud....
8 Pages (2000 words) Article

Security, Threat, Exposure and Vulnerability in Relation to Business Information Systems

Information security entails measures that detect threats, documents them and device ways of countering them In relation to computer security, threat represents the possible danger that might exploit the vulnerability of the computer system so as to cause a breach of security thus causing possible harm to the information system.... Possible threats allow hackers or unauthorized persons to gain access to the information system without being noticed or recognized by the information system....
6 Pages (1500 words) Assignment

Analysis of Internet Filters, Internet Censorship

… The paper 'Analysis of Internet Filters, Internet Censorship" is a good example of a management case study.... The present age can be acknowledged as the age of modern information technology.... After the emergence of the internet, this technology has attained a new shape.... Now we have better ways of communication, data transfer, and interaction....
9 Pages (2250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us