The future of intrusion prevention - Essay Example

Comments (0) Cite this document
A threat assessment methodology will provide the means to analyse and understand the threat agents in order to anticipate their moves and ways of engagement. Until now, threat assessment was just a part of risk analysis. Risk analysis is a process to assist management in defining where time and money should be spent (Nosworthy, 2000)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
The future of intrusion prevention
Read TextPreview

Extract of sample "The future of intrusion prevention"

Download file to see previous pages The reasons for conducting a risk assessment are (Neumann, 1995; Smith, 1993; Reid and Floyd, 2001; Katzke, 1988; Hancock, 1998; Brewer, 2000): new threats, new technology, new laws and new available safeguards.
The issue taken for the risk analysis and threat assessment was the students' violent behaviour at school. The aim of the assessment was to identify the next rebel by developing the profile of a typical rebel. To achieve this, a four spiked model of assessment was designed. This model provides a framework for evaluating a student in order to determine if he or she has the motivation, means, and intent to carry out a proclaimed threat. The assessment is based on the sum of the circumstances known about the student in four major areas.
Spike 1 (Personality of the student): Evidence to a student's personality can come from observing behavior when the student expresses characteristics like, managing with conflicts, disappointments, failures, insults, or other stresses encountered in everyday life, anger, frustration, disappointment, humiliation, sadness, or similar feelings.
Spike 1 (Personality of student): There may be involuntary signs shown by the student about his inclination to violence in his behavior, thoughts or attitudes. The student might often show out frustration and tries to alienate. There is a collection of acts of "injustice" done against him registered in his mind. The student often shows signs of depression such as lethargy, physical fatigue or lack of interest towards any activity performed. He exhibits selfishness and has self-centred thoughts with great inclination towards entertainment filled with violence. He behaves inhumane and has low tolerance levels.

Spike 2 (Family Background): The student might have a damaged relationship with parents. He might have easy access to weapons at home, unlimited non-monitored access to the media and internet.

Spike 3 (Academic History): The student might have a low tolerance for punishments and bullying at school. He might be with a school having fixed culture with unsupervised computer access. There might little trust with the teachers.

Spike 4 (Social History): The student might have companions who have great inclination to violent activities. He might have unlimited access to internet, computer and media. The knowledge of a student and his attitude towards the use of drugs and alcohol too play a vital role.

The Intervention Process
An effective intervention process by the school would be to manage the threat effectively by taking the following measures:
1. Inform the students and parents of the school policies
2. Appoint a Co-Ordinator for threat assessment
3. Enforcement of law in three levels - low, medium and high - while the intervention at low level would involve interview with the student and parents; the intervention ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“The future of intrusion prevention Essay Example | Topics and Well Written Essays - 2500 words”, n.d.)
Retrieved from
(The Future of Intrusion Prevention Essay Example | Topics and Well Written Essays - 2500 Words)
“The Future of Intrusion Prevention Essay Example | Topics and Well Written Essays - 2500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The future of intrusion prevention

Security Risk Analysis for Intrusion Detection and Prevention of Cybercrime the military network and the future of intrusion detection and prevention methods are touched upon. The paper recommends appropriate procedures to control the threats and reduce the vulnerability of the system to lower the level and make them acceptable keeping in mind the military network and the sensitivity of data protection in this case. Top five risks are analyzed and briefly reviewed. Current federal legislation and the standards based on securing and preventing cybercrime will be analyzed. Steps will be recommended to implement and maintain the strategy proposed. Risk analysis terms Security risk analysis also referred called risk assessment, is a basic...
8 Pages(2000 words)Essay

Intrusion Prevention

...?Intrusion Prevention Intrusion Prevention Introduction Hacker is a word used to refer tothose individuals who have a habit and an obsession to manipulate the hardware and software sectors of a system to make it work more efficient and effectively. The mass media especially the print media has posted a wrongful image of people who are recognized as hackers and this has negatively impacted a very positive term called hacker. According to the way media is defining a hacker, a hacker is an individual who has an obsession of breaking into computer systems to enjoy benefits of information and resources. When the term hacker came into existence and the way media portrayed a...
3 Pages(750 words)Essay

An Evaluation of Wireless Intrusion Prevention and Protecting Insecure Channels

...? Wireless 802.11 Security: An Evaluation of Wireless Intrusion Prevention and Protecting Insecure Channels George Lisboa Jr. American Public University System Professor: Belkacem Kraimeche Table of Contents Introduction 6 Essentials of Wireless LANS 7 What is Wi-Fi? 8 Benefits and Risks 10 Benefits 10 The disadvantages of Wi-Fi 11 Wireless Networking 11 Modes of Operation 12 Infrastructure wireless networking 13 Ad-Hoc Wireless Networking 13 Wireless Hacking Tactics 14 War Dialing 15 War Chalking 16 War Driving 16 War Flying 17 War Walking 17 War Pedaling 17 War Sailing 17 Wireless Hacking Tools 18 Wireless Security Threats 20 Ad-hoc Networks 20 Identity Theft (MAC Spoofing) 20 Man in the Middle Attacks...
30 Pages(7500 words)Research Paper

Intrusion Detection System

...Intrusion Detection System Intrusion Detection System (IDS) checks the network and its activities. It identifies any different activity and informs the administrator. Working of the system in a network and the network traffic are monitored by the Intrusion Detection system. Systems that create traffic among the network are identified and blocked. Intrusion Detection is used to manage the system and the network in a secured manner. Intrusion may occur from various sources. (Endorf 2004).IDS must be capable of identifying the security threats and prevent them from affecting the system or network. These detection systems make use of various...
14 Pages(3500 words)Essay

Intrusion Detection

...Running head: intrusion detection Intrusion Detection Affiliation September 2009 Computers are commanding tools that facilitate users to store and perform operations on huge amounts of data rapidly. Almost every organization, no matter what is size of organization, makes use of computers to manage bookkeeping, track inventory, and store documents. As organizations grow, they often need several people to enter and process data at the same time. For this to be advantageous, those people must be capable to share the data each person enters. Networking computers turns out to be advantageous in this state of affairs. Networks are merely a collection of computers linked by cable or other media so they can share information (Nash, 2000... ). There...
2 Pages(500 words)Essay

Intrusion Detection System

...Intrusion Detection System Introduction It is very important to keep track of all possible intrusions that a sensitive network might encounter (thesis statement). This can be done by keeping a strict check on proper configuration, management and monitoring of the firewall settings, intrusion detection system’s logs and anti-virus upgrades. A case study has been discussed here which involves a scenario where an intruder attacked port 3389 of a computer. Necessary Actions According to the case study given, the intrusion will drive me to take these actions: I shall tell myself to relax. Fright worsens the whole situation. One can think better with a composed mind. I...
2 Pages(500 words)Assignment

Intrusion Prevention and Detection: Securing Information

...Top of Form Grid for SLPs     Software Products Brief of the program and what it claims to do Specific business needs being addressed by program and value delivered by it Your reasons why you decided to check it out (first impression) Your overall evaluation of it, to the degree that you can judge; is it something youd use?  Why? (Please comment also on the effectiveness of the demo itself) Symantec Host Intrusion Detection and Prevention Solution Symantec Host IDS improves the safety of critical server platforms all through the business by offering real-time intrusion detection as well as new proactive... ...
2 Pages(500 words)Essay

Intrusion Prevention

...Intrusion Prevention Provide a brief of the program and what it claims to do Cisco intrusion detention software is a security solution that provides protection from unauthorized intrusions, malicious internet worms and any other bandwidth and e-business application attacks. The software offers dynamic protection since it covers a wide area of threats and attacks (Cisco Systems, 2011). Cisco IDS has been designed in such a way it offers protection from minor attacks to massive attacks. In addition, the software ensures businesses are provided with the required speed when undertaking their daily chores. The software is also creatively designed to ensure it keeps up with...
1 Pages(250 words)Essay

Intrusion Detection System

... Intrusion Detection System A system equipped to fight against firewall, malwares, and offers protection against viruses is not novice. This is because protecting the computer against these attacks is an essential part of computer management and protection policy. I agree with this argument of Justin concerning HIDS. HIDS is an intrusion detection system that screens and scrutinizes the internal parts of a computer system, and its own network interface. The system protects against attacks on the computer memory. QUESTION 2 I agree with this argument of David, since a layered defense provide security to a computing system At three different levels with the aim of...
2 Pages(500 words)Assignment

Guide to Intrusion Detection and Prevention Systems (IDPS) Written Report

...Guide to Intrusion Detection and Prevention Systems In the current speedy and constantly advancing technological world, the adoption of high quality intrusion detection and prevention systems (IDPS) has always been a subject of great concern. Network engineers, computer science professionals and other information security stakeholders are fighting tooth and nail to ascertain that they adopt the best set of tools for the implementation of secure mechanisms for the detection and prevention of intrusion in to an organization’s computer system or network. To be precise, the current ever-advancing hacking techniques have resulted into very...
25 Pages(6250 words)PowerPoint Presentation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic The future of intrusion prevention for FREE!

Contact Us