StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computers under Attack: IDS Alert - Essay Example

Cite this document
Summary
In the paper “Computers Under Attack: IDS Alert” the author discusses the IDS, which helps in recognizing and observing the intrusion attempts made by any internal or outside party into the organization’s network. These systems are made to spot the threats and then take suitable measures to remove them…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Computers under Attack: IDS Alert
Read Text Preview

Extract of sample "Computers under Attack: IDS Alert"

A hacker can exploit it using a remote desktop connection and could send malicious threats or Trojans to gain access to the computer from this port. Removing my PC from the network will help isolate it and stop transferring the threat or virus to other computers on the network. A well define thought and planning is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection, another serious factor is the resource issues that include manning the sensor feeds, product expenses, and infrastructure support that must also be kept in mind.

After the computer has been isolated the next step would be to detect and remove the threat using the appropriate Intrusion Detection Systems. Updated versions of spyware and Antivirus software will be installed on the PC if the current versions could not detect the threat. If I would be having a Windows operating system then I will at once boot the computer on Safe mode or from a clean floppy or bootable CD before starting the threat detection and cleaning process. Another important thing is to get enough knowledge about the virus or threat we are dealing with.

For this, I would use internet search engines like Google or Yahoo to know about the threat and effective procedures through which we can clean it. Some of the popular and effective antivirus software that are available in the market are AVG Antivirus, McAfee Virus Scan 2007 Professional Edition, and NOD32, etc. I will try to update that PC by installing any one of these IDS. I will also configure the Auto-update option in the antivirus software so that it automatically detects and download new virus signatures.

Other machines that are connected with this one will also be checked for threats as there could be a possibility of infection in those PCs too. Any possible security event like this one will be reported to the assigned security officer. Any activity or breach of security policy is a security incident. A set of rules and procedures should be maintained when dealing with these kinds of security incidences. All the incidents that are mentioned as serious by the security officers will be at once conveyed and reported to all the top-level management and the concerned authorities.

ConclusionBy reviewing the firewall and IDS logs it would give me the real picture of the scenario and will let me know the network activities that brought about this threat. Logs are basically the record of all the network activities going on that PC. (Hoffman, 1990) Logs are maintained by most of the Intrusion Detection Systems and they play a key part in analyzing the loopholes in our Computer Systems. An IDS logs unnecessary traffic but doesn't always block it. To overcome this problem I will install an updated firewall with good logging capabilities.

This is the detailed procedure through which I will recover my PC.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computers under Attack: IDS Alert Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Computers under Attack: IDS Alert Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/information-technology/1521760-ids-alert
(Computers under Attack: IDS Alert Essay Example | Topics and Well Written Essays - 500 Words)
Computers under Attack: IDS Alert Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1521760-ids-alert.
“Computers under Attack: IDS Alert Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/information-technology/1521760-ids-alert.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computers under Attack: IDS Alert

An improvement of Intrusion Detection System using HCI

People use Intrusion Detection System (ids) applications as assistant tools to detect illegal activities that will cause damage to their computer systems or networks.... Some ids users may have different duties than others.... ids users can be categorized from two perspectives: (1) their knowledge about network/system security management; and (2) the time and effort that they could put into intrusion detection.... An ids interface is expected to support numerous actions....
14 Pages (3500 words) Essay

Security Network Intrusion detection system (IDS)

A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP… Below is discussed a case study and important actions which become necessary in case of network intrusion. If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192.... ase Study If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192....
2 Pages (500 words) Essay

Computer networking and management

Sundaram, A.... (1996), An Introduction to Intrusion Detection, Association for Computing Machinery, Available from: http://www.... cm.... rg/crossroads/xrds2-4/intrus.... tml#ref1#ref1, [Accessed Feb 5, 2010] 37 Dierks (1999) described that transport layer security protocol is meant to… It ensures data integrity between two communicating entities....
26 Pages (6500 words) Essay

STATEGIC BUSINESS

The paper highlights the crucial role… Another important topic which has been discussed is the Identity Detection System (ids), its advantages, disadvantages, deficiencies and nges and the ways and means by which these could be remedied or fixed, so that uninterrupted and hassle-free use of internet could be ensured to the end-users and clients....
28 Pages (7000 words) Essay

System Security Planning: the Configuration of the System

It monitors a system under protection and also logs invasion attempts.... This paper will look at some security measures considered incorporated in a system security plan.... The system security plan is important for any organization.... The security plan will ensure the information system of a particular organization is well preserved....
5 Pages (1250 words) Research Paper

An Effective Technologies in Providing Effective Defense to Businesses

The paper describes the use of the services of an IT infrastructure in the workplace in order to store, retrieve data as required.... In order to provide the required IT solutions, it is necessary to connect people across a broad domain that spans across physical and geographical frontiers.... hellip; Networks are a standard component of any IT solutions within a business environment and the size, speed, scale and efficiency of the network depends on the demand and the range of responsibilities that the network needs to provide....
17 Pages (4250 words) Research Paper

Denial of Service Attacks

The DoS attacks can be described as a single group or person's spiteful attack to cause the site.... This kind of occurrence is what is known as a DDoS or DoS attack.... It is from this overview that this paper will analyze this attack, how it happens, propagates the Malicious Code, its taxonomy, problems caused, and countermeasures.... For the malicious users, to launch a successful DDoS attack, they first have to build a computer network that will be used in producing the traffic volume necessary to prevent the users from gaining the computer services....
8 Pages (2000 words) Term Paper

Computer Security - Oracle and MySQL Server

It employs the use of triggers to as alert for data accessed or changed (Haubrich, 7).... … The paper "Computer Security" is a wonderful example of an assignment on logic and programming.... Evaluation of a software system is a fundamental aspect of ensuring that the system meets the user requirements specified in its system requirements specification document....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us