StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

IDS Policy Parameters and Network Intrusion - Essay Example

Cite this document
Summary
From the paper "IDS Policy Parameters and Network Intrusion" it is clear that the workers must be capable to share the data each person enters. As a result, networking computers becomes essential. Networks are merely a group of computers linked by cable or other media so they can share information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
IDS Policy Parameters and Network Intrusion
Read Text Preview

Extract of sample "IDS Policy Parameters and Network Intrusion"

There are different evils associated with network structures. For instance, personal information theft, business information hacking, and virus attacks are the contemporary issues businesses are facing nowadays in the network communication and data transfer areas (Frederick, 2002). Furthermore, because of the increasing amount of intrusions the local networks and Internet have turned out to be uncertain, therefore, businesses are more and more applying a variety of systems that monitor information technology security breaches (Sans, 2009).

Network intrusion as its name represents attempts to recognize attempted or applied intrusions into the network and to carry out proper actions for the intrusions. Intrusion detection includes an extensive collection of methods that differ on several axes. A few of these axes comprise: (Silberschatz, Galvin, & Gagne, 2004)
• The period that detection takes place: in real-time (while it is taking place) or following the information only.

• The types of input inspected to identify intrusive action. These could comprise user shell commands, process system calls, as well as network packet headers or contents. Several types of intrusions might be identified only by correlating information from various such sources.

• The variety of action capabilities. Basic and straightforward types of actions consist of changing an administrator of the possible intrusion or in some way halting the potentially intrusive action, for instance, killing a course of action engaged in the intrusive activity. In a complicated type of action, a system might redirect an intruder’s action to a trap. A false resource is exposed to the attacker to observe and gain information about the attack; to the attacker, the resource appears real.

These levels of freedom in the design of space for detecting intrusions in systems have brought an extensive variety of solutions acknowledged as intrusions detection systems (IDS) (Silberschatz, Galvin, & Gagne, 2004).

Gem Infosys desires to protect the business network and organizational business resources. The main aim and objective of this policy are to offer procedures to set up security monitoring and intrusion detection to defend business resources as well as data on the organizational network. Gem Infosys policy is intended to protect both the privacy of business data that can be stored on the Gem Infosys computer as well as to shield the managerial network from being infected through some hostile software that can be approached from the broadband connection to the Internet. This IDS policy as well cares for the business network access for different users in the corporate (Comptechdoc, 2009).

Scope
This Gem Infosys IDS policy covers each network host on the business network as well as the whole data business network comprising each path through which business data can travel. The main goal behind this policy implementation is to protect the system from outer assaults on the corporate network. Also, another aim is to establish a security plan that addresses all the aspects of security such as internal and external security management (window security, 2009).

IDS Policy Parameters

The main objective of the IDS policy for Gem Infosys is:
1. Enhancing the security level internally and externally to the business.
2. Preventing un-authorized system entrance
3. Preservation of the business data
4. Establishing integrity of the business information
5. Establishment of appropriate security parameters to stop external intrusions
6. Permitting access only to authorized users
7. Detection and handling of any suspected network intrusion

Conclusion
This paper has presented a detailed analysis of the IDS policy for Gem Infosys. This paper has presented a detailed overview of the different aspects and parameters of the IDS policy and operating structure. Through the implementation of this IDS policy, Gem Infosys can protect the overall network from outer attacks. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IDS policy Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
IDS policy Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1560634-ids-policy
(IDS Policy Essay Example | Topics and Well Written Essays - 500 Words)
IDS Policy Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1560634-ids-policy.
“IDS Policy Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1560634-ids-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF IDS Policy Parameters and Network Intrusion

Analyzing and contrasting data mining based network intrusion detection

Among these security tools, network intrusion detection systems hold the potential to become a tool against computer crime.... Data mining can be a very useful methodology for identifying any intrusion that might have taken place.... This dependence on computer networks leads to many different intrusion possibilities that threaten important data.... The need for security has spawned in the design of firewalls, cryptography, authentication and many different intrusion detection systems....
48 Pages (12000 words) Thesis

Analyzing and contrasting data mining based network intrusion detection system

The objective of this research is to acquire a better insight about Data Mining-Based network intrusion Detection Systems.... Among these security tools, network intrusion detection system holds a potential as a tool against computer crime.... Data mining can be proved as a very useful method towards identifying any intrusion that might have taken place.... In such networks there is every possibility of intrusion to important data....
46 Pages (11500 words) Essay

Network Security

Organizations normally install a firewall and even intrusion detection systems that triggers alerts of any suspicious activity, as these two components only covers the technical domain and not the human and physical domain.... Moreover, there are no advanced security appliances such as intrusion detection systems for analyzing and monitoring any suspicious activity that may possibly become a threat to the University's computer network.... This paper ''network Security'' discusses that by utilizing quantitative and qualitative research methods, we will analyze different aspects of organization wide information security....
16 Pages (4000 words) Research Paper

Network and Operating System Investigation

The paper "Network and Operating System Investigation" has demonstrated the significance of intrusion Detection System that may upsurge network security and the probability to detect potential threats.... Why IDS As per network dictionary, IDS is defined as 'intrusion detection system (IDS) is a type of security management system for computers and networks.... Even small companies are integrating their business process with a small computer network....
4 Pages (1000 words) Research Paper

A Critical Analysis of Computer Network Security Methods

The paper "A Critical Analysis of Computer network Security Methods" tells us about information technology.... The exponential growth of the most popular public network, the Internet, has made inter-communication fast and effective.... Encryption/decryption results in reduced network performance in terms of capacity and delay but provides security.... ESP contains SPI (Security parameters index) for security association, sequence number, variable payload data (segment or encrypted IP packet), padding for alignment and concealing actual payload length (0-255 bytes), pad length (8 bits), next header information (8 bits) and variable authentication data (integral of 32 bits) (Stallings, William, 498)....
21 Pages (5250 words) Essay

Private Network Extranet

In order to prevent these issues, intrusion detection system (IDS) is essential.... The following thesis entitled "Private network Extranet" is focused on the network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.... The threats consisting of virus, malicious codes, unauthorized remote access, unauthorized access to domains and classified data, intrudes in the network from a security loophole....
8 Pages (2000 words) Thesis

Designing Networks in Waxlow Private School

As the paper highlights, the campus area network connects with two or more networks of the educational institutes, universities or corporate campus.... The network devices and computing pieces of equipment have to be reliable and extendable, if the faculty staffs increases.... The governing body has decided to implement an IP based network.... The network layout of the school requires an expandable and efficient network which will fulfill the requirements of the school staff....
28 Pages (7000 words) Research Paper

Network and Communication Security Protocols

Incorporation of an intrusion detection system (IDS) is compulsory as it will penetrate deep in the network and detect unknown activities related to unauthorized access, viruses and hacking.... An anomaly-based intrusion detection system is based on a data driven methodology that complies with data mining techniques.... This research paper "network and Communication Security Protocols" focuses on potential and advanced persistent threats along with their impact on different governmental sectors of the country....
31 Pages (7750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us