We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Fiber Optic Security Systems - Thesis Proposal Example

Comments (0)
Summary
Globalization and technology advancement have facilitated the rapid development of the internet and other communication systems. Communication plays an imperative role in the success of any corporation or organization. Data and information flow in the internet allow for swift transactions through the internet, opening the business milieu to unlimited market and colossal profits…
Download full paper
GRAB THE BEST PAPER
Fiber Optic Security Systems
Read TextPreview

Extract of sample
Fiber Optic Security Systems

Download file to see previous pages... They analyze the information such as calls, File systems and modifications application logs and other host information to detect and suppress attacks.
Wireless IDPS: They are used to detect intrusions on the wireless system and rogue access points (unauthorized wireless access point used by hackers).
Other IDPS systems
PIDPS: (Packet Intrusion Detection System) used for packet sniffing to detect attacks.
APIDS: It monitors a group of servers by analyzing and monitoring communication between the application protocols.
Hybrid intrusion detection systems: Hybrid intrusion detection systems are more efficient and effective in detecting attacks and controlling them. They consist of a combination of several intrusion detection systems integrated into one device.
The key function of IDPS systems are
Detection of intrusion
Recording of information on the detected events
Notifying the administrator of the detected events
Trigger preventive measures such as port blocking, limiting access of the suspect program as well as deleting infected files.
The main parts of an IDPS system are:
Sensor: generates the security event
Console: monitors the event
Engine: it records the events logged by the sensors in a specified database.
1.2.2 Methods of detecting intrusion
Though there are many methods of detecting intrusions, the principal methods are:
Signature based intrusion
The IDPS detects a given pattern corresponding to a known threat. The known events are those that were detected and are known to cause harm in the past. For example, an email with an attached file (freepics.Exe) is usually a characteristic of malwares, or an operating system log with code 645 that depict that the host is disenabled or a...
A malicious program or E-mail causes unwanted manipulation and alteration of information and files, deleting of vital information and emails, software corruption and the transfer of information without the authority or consent of the user or the system administrator (Crothers, 2002). The major roles of IDPS are to protect networks and computers from:
Host based IDPS; Identifies intrusion on hosts and agents. They analyze the information such as calls, File systems and modifications application logs and other host information to detect and suppress attacks.
Hybrid intrusion detection systems: Hybrid intrusion detection systems are more efficient and effective in detecting attacks and controlling them. They consist of a combination of several intrusion detection systems integrated into one device.
The IDPS detects a given pattern corresponding to a known threat. The known events are those that were detected and are known to cause harm in the past. For example, an email with an attached file (freepics.Exe) is usually a characteristic of malwares, or an operating system log with code 645 that depict that the host is disenabled or a Telenet with user name 'root' that violates security policy. ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
The Impact of New Media on CRM-Systems
This research aims to suggest new and innovative ways of maximizing the changing face of the media; expose business owners, employers and managers to the basic needs and expectations of the customer in the running of businesses; enhance communication in the organization; maximize the influence of new media on customer relationship management system.
41 Pages(10250 words)Thesis Proposal
Information security management system in business organisations in Saudi Arabia
Incompetent business processes and operations also threaten the intellectual assets of the organization. It is due to these reasons that the information security management systems have become vital for organizations. Saudi Arabia is considered to be in the initial phases of the integration of technology in their business organizations.
6 Pages(1500 words)Thesis Proposal
Fiber Optic Cables

The author states that in order to test fiber optic cables, many tests are conducted to ensure reliable connectivity. Some basic tests are highlighted that are associated with continuity testing, insertion loss and Optical time Domain Reflectometer. Continuity testing method involves continuous checking of broken fibers from one end to the other.

5 Pages(1500 words)Research Paper
Electronic Data Interchange and Interorganizational Systems
According to the paper EDI works by the means of sequential messaging primarily between two organisations or parties. The transmission is based on a simple originator-recipient model. The data can be transferred from the originator to the recipient by telecommunications or transported physically on electronic storage devices.
9 Pages(2250 words)Thesis Proposal
Fiber Optic Cable use in the European Market
In order to assess the trends, Electronicast had conducted a research and has come to a conclusion that optical fiber based communication will grow to become a major part of Europe's communication mechanisms. One of the profound reasons for this has been the fact that the rise in the volume of network traffic in the recent years has been accommodated by the use of fiber optic cables and it has been found that the technology has been more satisfactory in comparison to other existing cabling solutions.
18 Pages(4500 words)Annotated Bibliography
Fiber Optic cables
Fabrication of it is in such a way that this pipe can guide light from one end of it to the other. The idea of having light guided through bent glass is not new or high tech. Concept of total internal reflection of light through bent glass plays an important role for working fiber optic cable.
11 Pages(2750 words)Essay
Balance between wireless security and performance
The wireless security systems have been scrutinized as being restricted in terms of performance. Studies have indicated that eavesdropping is quite easier in the wireless security than in the Local Area Network. This
2 Pages(500 words)Thesis Proposal
Unmanned Aerial Vehicle Systems (UAVs)
It can be wrongly used to violate the citizen’s constitutional rights to privacy and unfair government involvement in non-violent or
4 Pages(1000 words)Thesis Proposal
Job security and its impact on national security
Many analysts have been critical of the effects of such changes in the market with some believing that the changes have made it difficult for the stakeholders to implement the standards and regulations of employment. On the other hand, the
15 Pages(3750 words)Thesis Proposal
The development of measurement systems that align with the objectives of public sector organisations
According to Braz, Scavarda and Martins (2011), performance management is a strategy that allows the organisation to streamline their work process so that they can keep
10 Pages(2500 words)Thesis Proposal
Let us find you another Thesis Proposal on topic Fiber Optic Security Systems for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us