Nobody downloaded yet

IDS Policy - Essay Example

Comments (0) Cite this document
A well define thought and planning for Gem Infosys is necessary before installing an Intrusion Detection System (IDS) on a network. Besides technical issues and product selection another serious factor are the resource issues that includes manning the sensor feeds, product expenses and infrastructure support that must also be kept in mind.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
IDS Policy
Read TextPreview

Extract of sample "IDS Policy"

Download file to see previous pages These systems could be any workstation, server or other network peripherals such as a router. The IDS system runs as a service or a process and has the ability to detect the network traffic on the host system. To save the system from past threats a "threat signature" database is present to make sure that the system is not vulnerable to those threats. Microsoft, Cisco and Tripwire etc. are some of the companies that deal in these IDS systems. (Spafford, Zamboni, 2000)
2. Network Based IDS: These are systems that confine and analyze packets on the wire. Network based IDS are used to protect the entire systems on the network unlike Host base IDS which are built for a single system. After confining the packets on the network they send it to the IDS console for inspection. Major vendors include Cisco and Symantec.
As Gem infosys is a small software company having just 10 PC's and a broadband connection should not face much difficulty with the IDS system. But sometimes IDS solutions can bring out bogus alarms that may result in incorrect distribution of information. Inadequate potential and bad configuration choices are the major factors for this kind of problem. On the other hand many products need to be kept updated and well managed to avoid problems such as well updated sensors.
Proc ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“IDS Policy Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
IDS Policy Essay Example | Topics and Well Written Essays - 500 words. Retrieved from
(IDS Policy Essay Example | Topics and Well Written Essays - 500 Words)
IDS Policy Essay Example | Topics and Well Written Essays - 500 Words.
“IDS Policy Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Network Securty Hardware and IDS systems

...the packets invalid packets from moving on the LAN. A router not only checks for the valid destination address but also ensures the delivery of flawless packets to the destination. If a router finds any sort of error in a packet, it discards that packet and sends the remaining message to the destination. Therefore, we can say that a router is a very important data transfer device used on a network. Topic # 2 An Intrusion Detection System (IDS) is a software application, which not only detects and stops unauthorized activities but also reports them to the network administrators for further action. One of the most famous Intrusion Detection Systems is Snort, which is used to detect the presence of worms, malicious...
2 Pages(500 words)Research Paper

Traditional and Wireless IDS/IPS Techniques

Previously, firewall and other related monitoring tools were not sufficient to cater to the needs for efficient security architecture. Likewise, new and improved sensing technologies are now mandatory for any organization maintaining highly classified data. Consequently, IPS/IDS (Intrusion Prevention System / Intrusion detection system) are invented. They are derived from the traditional security appliances, and defined by the computer desktop encyclopedia, as a sensor “set up to detect illegal actions within the host. Most IDS programs typically use signatures of known cracker attempts to signal an alert. Others look for deviations of the normal routine as indications of an attack. Intrusion detecti...
5 Pages(1250 words)Research Paper


...decision in relation to their spending. They will minimize their spending to conform to the skewed budget. Therefore, the spending in the economy will drastically reduce. As a matter of fact, the economy will be losing since the money circulation in the economy is skewed to the budgets of the public workers. Social welfare policy The social welfare policy is controversial in that it deems to assist all the people in the society. This is done by the government talking some of the amounts of cash garnered from the rich people in the society to fend for the needs of the poor people in the society. To the poor people, this is a prudent approach in taking care of the welfare. The poor people are given grants...
9 Pages(2250 words)Essay

IDS Alert

...will also be checked for threats as there could be a possibility of infection in those PC's too. Any possible security event like this one will be reported to the assigned security officer. Any activity or breach of security policy is a security incident. A set of rules and procedures should be maintained when dealing with these kinds of security incidences. All the incidents that are mentioned as serious by the security officers will be at once conveyed and reported to all the top level management and the concerned authorities. Conclusion By reviewing the firewall and IDS logs it would give me the real picture of the scenario and will let me know the network activities that brought about this threat....
2 Pages(500 words)Essay

Security Network Intrusion detection system (IDS)

...Network Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network’s security. A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP address from accessing the network. Below is discussed a case study and important actions which become necessary in case of network intrusion. Case Study If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at and the mouse pointer starts moving by itself, I would carry out the following steps. 1) The first and foremost thing is...
2 Pages(500 words)Essay

IDS policy

...Running head: IDS Policy IDS Policy Affiliation December 2009 Computers are powerful devices that assist people to store information and carry out operations on huge amounts of data quickly. Almost every firm, regardless of size, utilizes computers to handle bookkeeping, track inventory, and store documents. However, when businesses grow, they often need several workers to enter and process data at the same time. For this to be beneficial, those workers must be capable to share the data each person enters. As a result, networking computers becomes essential. Networks are merely a group of computers linked by cable or other media so they can share information (Nash, 2000). Also, there are different evils associated to these network... type of...
2 Pages(500 words)Essay

Public Policy- Environmental Policy

...Public Policy: Politics, Analysis, and Alternatives. The main purpose of this policy was to generate a framework that will encourage productive and harmonious coexistence between man and the environment that he exploits. The policy was to further promote programs that will prevent environmental and biosphere damage and promote health and man’s welfare .In addition, was to enable us understand the value of ecological systems as well as natural resources that are of great importance to the Nation and the world at large. The policy recognizes the interrelationship among the components of environment, and more so, the influences of population growth, urbanization,...
4 Pages(1000 words)Essay

Advantages and dis-advantages of IPS/IDS

...Advantages and Disadvantages of IPS/IDS Introduction: IDS or Intrusion Detection System is a system that enables detection of wrong, erroneous, or abnormal activity. It is generally used to detect whether a computer system has been intruded in any unauthorized manner or not. An IPS or Intrusion Prevention System is enables dynamically dropping data packets or cut off unauthorized connections. The present study focuses on the advantages and disadvantages of IPS/IDS. Advantages of Using an Integrated CISCO IPS/IDS Solution: Although snort performs detection and prevention of abnormal activities within a system, yet the benefits of Cisco IDS/IPS are more....
2 Pages(500 words)Essay


...Report on food safety program Introduction The main aim of agriculture department is to develop and execute a number of policies on behalf of the federal government in areas of agriculture, subsistence and commercial farming and forestry. The main objective of this department is to meet the need of all farmers and ranchers in all states. In addition, the department promotes agricultural trade both locally and internationally, develops and monitors programs on food safety as well as protecting natural resources in the country. Food safety has become an issue of concern to most people and households in the country due to the incorporation of the latest technology in farming and processing most farm produce. Hence, the...
4 Pages(1000 words)Essay

Monetary policy&fiscal policy

...Monetary Policy and Fiscal Policy Summary of the Monetary Policy Article Federal Reserve recognized that the rate of economic growth was not so fast and the central bank decided to continue purchasing bonds at the rate of $85 billion per month as offered in Fed’s program, as a way of stimulating the economy. Jim Zarroli from NPR in his explanation of whether the program has anything to contribute towards the direction of the economy declined to it having much contribution stating that the view of Fed in the economy is concerned about what has been for some time. He views this as being middling. He notes in relation to this, the high unemployment levels despite the improvement in the...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic IDS Policy for FREE!

Contact Us