StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

IDS Policy - Essay Example

Comments (0) Cite this document
Summary
A well define thought and planning for Gem Infosys is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
IDS Policy
Read TextPreview

Extract of sample "IDS Policy"

RUNNING HEAD: INTRUSION DETECTION SYSTEM Intrusion Detections System of the of the Intrusion Detections System
Introduction
A well define thought and planning for Gem Infosys is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.
Basically the IDS help in recognizing and observing the intrusion attempts made by any internal or outside party into the organization's network. These systems are made to spot the threats and then take suitable measure to remove them.
Discussion
Basically there are two types of IDS
1. Host based IDS: These are systems that are typically installed on the host systems that are planned to monitor. These systems could be any workstation, server or other network peripherals such as a router. The IDS system runs as a service or a process and has the ability to detect the network traffic on the host system. To save the system from past threats a "threat signature" database is present to make sure that the system is not vulnerable to those threats. Microsoft, Cisco and Tripwire etc. are some of the companies that deal in these IDS systems. (Spafford, Zamboni, 2000)
2. Network Based IDS: These are systems that confine and analyze packets on the wire. Network based IDS are used to protect the entire systems on the network unlike Host base IDS which are built for a single system. After confining the packets on the network they send it to the IDS console for inspection. Major vendors include Cisco and Symantec.
Setbacks with IDS solutions
As Gem infosys is a small software company having just 10 PC's and a broadband connection should not face much difficulty with the IDS system. But sometimes IDS solutions can bring out bogus alarms that may result in incorrect distribution of information. Inadequate potential and bad configuration choices are the major factors for this kind of problem. On the other hand many products need to be kept updated and well managed to avoid problems such as well updated sensors.
Developing an IDS Policy
In the pre deployment stage when Gem Infosys is installing an IDS a policy needs to be designed in order to make sure that responsibilities and processes are well defined.
Procedures will be maintained for recognizing the security threats. Incidents will be classified as "non-serious" or "serious". If there is a problem of failing hardware, target network administration should be fully responsive that if network taps are used, even fail safe taps can take up to a second to re-negotiate with the interfaces and could upset the services. (Liepins, Vaccaro, 1992)
Non-serious incidents policy
When devising the policies Gem Infosys should know that Non Serious incidents include those activities in which the attack or threat is not purposely directed at the organizations network.
It should also be analyzed that no sensitive data or information is revealed or used in an illegal manner or without any authorization.
Serious Incidents Policy
Those activities in which the attack or threat is purposely directed at the organizations network.
Sensitive data or information is revealed or used in an illegal manner or without any authorization.
All the networking and IT staff of Gem Infosys will report any possible security event that they come to know to the assigned security officer. Any activity or breach of security policy is a security incident. The organization will maintain a set of rules and procedures when dealing with these kinds of security incidences.
All the incidents that are mentioned as serious by the security officers will be at once conveyed and reported to all the top level management and the concerned authorities.
The organization will try to alleviate any damaging effects, when possible, if a security incident affects customer information.
Conclusion
Confidence gaining of the network's staff is essential to a successful setting up of an IDS system. The network and system administrator's views and concerns should always be given importance as they are managing the whole network of Gem Infosys and have a better view of the whole scenario. Gem infosys should try to win the hearts and minds of all the network staff and in return the company will get a good threat free network.
References
Liepins, G. E.; Vaccaro, H. S.: Intrusion Detection: It's role and validation, Computers & Security 11/1992, 347 - 355
Spafford, E. H.; Zamboni, D.: Intrusion detection using autonomous agents, in Computer Networks, Volume 34, Issue 4, October 2000, 547-570 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IDS Policy Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
IDS Policy Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1531647-ids-policy
(IDS Policy Essay Example | Topics and Well Written Essays - 500 Words)
IDS Policy Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1531647-ids-policy.
“IDS Policy Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1531647-ids-policy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF IDS Policy

Network Securty Hardware and IDS systems

Topic The hardware device, which I have selected for discussion is a router. A router is a device, which operates at the network layer of the OSI model. It is used to transfer data from source to destination by forming a connection between different networks. A router makes use of a configuration table to decide whether it should allow sending of a packet or not. A router establishes an appropriate and valid path for the packet that a source computer sends to a desired destination. A configuration table includes information on which connections lead to particular groups of addresses, connection priorities, and rules for handling the traffic (Franklin, n.d.). Routers have a built-in mechanism, which ensures LAN protection by blocki...
2 Pages(500 words)Research Paper

Traditional and Wireless IDS/IPS Techniques

...Traditional and Wireless IDS/IPS Techniques Security in terms of computer networks has marked its significance. Senior management address security issues to an optimal level and enforces strict security procedures in order to protect strategic and financial assets. Previously, firewall and other related monitoring tools were not sufficient to cater the needs for efficient security architecture. Likewise, new and improved sensing technologies are now mandatory for any organization maintaining highly classified data. Consequently, IPS/IDS (Intrusion Prevention System / Intrusion detection system) are invented. They are derived from the traditional security appliances, and defined by the computer desktop encyclopedia, as a sensor “set...
5 Pages(1250 words)Research Paper

Policy

... decision in relation to their spending. They will minimize their spending to conform to the skewed budget. Therefore, the spending in the economy will drastically reduce. As a matter of fact, the economy will be losing since the money circulation in the economy is skewed to the budgets of the public workers. Social welfare policy The social welfare policy is controversial in that it deems to assist all the people in the society. This is done by the government talking some of the amounts of cash garnered from the rich people in the society to fend for the needs of the poor people in the society. To the poor people, this is a prudent approach in taking care of the welfare. The poor people are given grants and other economic assistance...
9 Pages(2250 words)Essay

Computers under Attack: IDS Alert

... will also be checked for threats as there could be a possibility of infection in those PC's too. Any possible security event like this one will be reported to the assigned security officer. Any activity or breach of security policy is a security incident. A set of rules and procedures should be maintained when dealing with these kinds of security incidences. All the incidents that are mentioned as serious by the security officers will be at once conveyed and reported to all the top level management and the concerned authorities. Conclusion By reviewing the firewall and IDS logs it would give me the real picture of the scenario and will let me know the network activities that brought about this threat. Logs are basically the record of all...
2 Pages(500 words)Essay

Security Network Intrusion detection system (IDS)

...Network Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network’s security. A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP address from accessing the network. Below is discussed a case study and important actions which become necessary in case of network intrusion. Case Study If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192.168.2.124 and the mouse pointer starts moving by itself, I would carry out the following steps. 1) The first and foremost thing is to have a grip...
2 Pages(500 words)Essay

IDS policy

...Running head: IDS Policy IDS Policy Affiliation December 2009 Computers are powerful devices that assist people to store information and carry out operations on huge amounts of data quickly. Almost every firm, regardless of size, utilizes computers to handle bookkeeping, track inventory, and store documents. However, when businesses grow, they often need several workers to enter and process data at the same time. For this to be beneficial, those workers must be capable to share the data each person enters. As a result, networking computers becomes essential. Networks are merely a group of computers linked by cable or other media so they can share information (Nash, 2000). Also, there are different evils associated to these network...
2 Pages(500 words)Essay

Public Policy- Environmental Policy

... Public Policy: Politics, Analysis, and Alternatives. The main purpose of this policy was to generate a framework that will encourage productive and harmonious coexistence between man and the environment that he exploits. The policy was to further promote programs that will prevent environmental and biosphere damage and promote health and man’s welfare .In addition, was to enable us understand the value of ecological systems as well as natural resources that are of great importance to the Nation and the world at large. The policy recognizes the interrelationship among the components of environment, and more so, the influences of population growth, urbanization, industrialisation, new expanding technological advances, exploitation...
4 Pages(1000 words)Essay

Advantages and dis-advantages of IPS/IDS

...Advantages and Disadvantages of IPS/IDS Introduction: IDS or Intrusion Detection System is a system that enables detection of wrong, erroneous, or abnormal activity. It is generally used to detect whether a computer system has been intruded in any unauthorized manner or not. An IPS or Intrusion Prevention System is enables dynamically dropping data packets or cut off unauthorized connections. The present study focuses on the advantages and disadvantages of IPS/IDS. Advantages of Using an Integrated CISCO IPS/IDS Solution: Although snort performs detection and prevention of abnormal activities within a system, yet the benefits of Cisco IDS/IPS are more. This is because the wireless and the network features of IDS/IPS of the Cisco WLC...
2 Pages(500 words)Essay

Policy

... Report on food safety program Introduction The main aim of agriculture department is to develop and execute a number of policies on behalf of the federal government in areas of agriculture, subsistence and commercial farming and forestry. The main objective of this department is to meet the need of all farmers and ranchers in all states. In addition, the department promotes agricultural trade both locally and internationally, develops and monitors programs on food safety as well as protecting natural resources in the country. Food safety has become an issue of concern to most people and households in the country due to the incorporation of the latest technology in farming and processing most farm produce. Hence, the department has...
4 Pages(1000 words)Essay

Monetary policy&fiscal policy

... Monetary Policy and Fiscal Policy Summary of the Monetary Policy Article Federal Reserve recognized that the rate of economic growth was not so fast and the central bank decided to continue purchasing bonds at the rate of $85 billion per month as offered in Fed’s program, as a way of stimulating the economy. Jim Zarroli from NPR in his explanation of whether the program has anything to contribute towards the direction of the economy declined to it having much contribution stating that the view of Fed in the economy is concerned about what has been for some time. He views this as being middling. He notes in relation to this, the high unemployment levels despite the improvement in the labor market, and other cases such as high investment...
2 Pages(500 words)Assignment

General Electric Long Term Financing Policy

The tagline of the company is becoming “bringing good things to life” (“General Electric” n.d.).
Concerning the situation, in this paper, I would like to discuss three sections of General Electric issues. Section 1 is about the company’s long term financing; Section 2 is concerning risk management; and Section 3 is about a synergistic acquisition, which is suitable for General Electric.
In today’s business practices, investors or managements often face a dilemma. At one occasion, they need to develop their business in order to sustain growth but on the other hand they have limited budget to invest. Under such circumstances, a company should consider loan option or use their own money r...
12 Pages(3000 words)Case Study

Has Bush Pursued a Realist Foreign Policy

This discussion will address what will define the entire Bush Presidency, not simply the foreign policy aspect; the illegal, immoral and unrealistic decision to invade Iraq.
The ‘War on Terrorism’ as it is commonly referred to, was a phrase coined by United States government officials and is primarily used to justify the military initiative de jour. It is generally defined as the current conflict between the U.S. and radical Islamic factions with Great Britain being somewhat allied in the effort (Gallington, 2004). Immediately following and as a reactionary response to the 11 September 2001 terrorist attacks on America, Bush stated the country’s intent to initiate a ‘War on Terrorism.’ He charact...
9 Pages(2250 words)Assignment

Putins Foreign Policy Changes during His First Presidential Term

Our world, since its ‘origination’ has been a ‘hotbed’ of activity. Activity in the sense, we humans have been showing activeness both mentally and physically, which have transformed our globe from a primitive one to an advanced one. The activities are normally carried out by humans, organizing or segregating themselves into different countries or nations. It is common knowledge that for a country to reach the top echelons, its leader has to be very capable and strong. That is, a capable and strong leader will only be able to provide a better life and future for his/her country and its citizens. From time immemorial, the success or failure of a country depends on the role, the leader plays. The leader is th...
82 Pages(20500 words)Dissertation

EU Telecommunications Policy

Although the policy conducted by the European Union in telecommunications involves a broad set of political objectives, the key motive underlying the majority of reforms in the sector is the liberalization of the telecommunications industry.  The role of the state in the European telecommunications sector has traditionally been immense because of the importance of telecommunications for internal and external security. The provision of facilities that ensure communication over long distances was reasonably perceived as an unalienable function of the state: some authors used to address this function as a key element in the ‘logistics of power’ of the state (Mann 1986). Consequently, the sphere of telecommunications...
10 Pages(2500 words)Term Paper

United States Foreign Policy from 1945-1991

American Presidents presiding over some key events in history, such as the Cuban Missile Crisis, The Cold War, The Vietnam War, etc., were hindered from acting as public representatives due to pressure from the military-industrial complex. John Kennedy, Lyndon Johnson, Ronald Reagan, George Herbert Walker Bush, and George W. Bush – all of them were subject to these opposing interests. But eventually, the corporate-government nexus proved too powerful; and in this sense, American Presidents after the Second World War were largely restricted and powerless to uphold their higher personal values. Most of the strategic moves on part of the United States after the end of the Great War were directly in response to an anticipated th...
11 Pages(2750 words)Essay

Contemporary Issues in World of Politics Climate Change Policy

It is more than a particular problem of any specific community. In fact, climate change has a wider global nature compared to other environmental issues and it affects the people of every nation and boundary. Therefore, the issue of climate change has a far wider reach than the other environmental issues and it is an issue concerned with almost all the international communities. It is identifiable that national boundaries may attempt to prevent the movement of people and goods across the boundaries of the nation. However, when it comes to pertinent environmental issues such as climate change, these issues do not stop at borders, making them – some would argue – quintessentially global phenomena. “Climate change i...
6 Pages(1500 words)Case Study

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

UK Employment Policy

Analysts explain that this situation is not simply because citizens don’t want to exercise this fundamental right, but largely because of the continued failure of the governments to institute an effective implementation of employment policies put in place (Howell, 2005). It has clearly been demonstrated by Mathew (2006) that the United Kingdom government has shown a lot of unwillingness in tackling the reported unemployment crisis.

Available research findings reveal that there are high unemployment rates among UK born ethnic minorities which show great diversities. According to a 2001 report, it is shown that unemployment rates amongst UK born men and women from black, Bangladeshi and Pakistani ethnic groups were...
9 Pages(2250 words)Case Study

Money Policy versus Credit Market

Financial institutions generally engage in securitization to enhance their profits by trading in the collateralized backed securities that generate high yield returns to the financiers. This nevertheless inversely and negatively affected the credit markets as their efforts to enhance their liquidity positions backfired. Consequently, the import of these monetary strategies has generated cyclical effects on the monetary system to the detriment of the financial system.

Normally, money markets demonstrate a more efficient allocation of credit whenever additional liquidity is injected into the system, which would otherwise display some undesirable distortions. Ultimately, the liquidity market is not easily susceptible to ex...
6 Pages(1500 words)Case Study

European Union Policy: Turkey

...Running Head: European Union.... Topic: European union policy Order#: 377392 Topic: European union policy Profile of Turkey-history, geography and population: “Area: Approx 780,000 sq km (300,000 sq miles) Population: 71.9m (July 2008 est) Capital city: Ankara People: Majority Turks. Minorities recognised under the Turkish Constitution: Jews, Armenians and Greeks. Other ethnic peoples include Kurds, Circassians and Bosnians. Language: Turkish (official), Kurdish Religion: Muslim Currency: Turkish Lira (TL) Government: Parliamentary republic. Membership of international...
9 Pages(2250 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic IDS Policy for FREE!

Contact Us