Free

IDS policy - Essay Example

Comments (0) Cite this document
Summary
Almost every firm, regardless of size, utilizes computers to handle bookkeeping, track inventory, and store documents. However, when businesses grow,…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
IDS policy
Read TextPreview

Extract of sample "IDS policy"

Running head: IDS Policy IDS Policy Affiliation December 2009 Computers are powerful devices that assist people to store information and carry out operations on huge amounts of data quickly. Almost every firm, regardless of size, utilizes computers to handle bookkeeping, track inventory, and store documents. However, when businesses grow, they often need several workers to enter and process data at the same time. For this to be beneficial, those workers must be capable to share the data each person enters. As a result, networking computers becomes essential. Networks are merely a group of computers linked by cable or other media so they can share information (Nash, 2000). Also, there are different evils associated to these network structures. For instance, personal information theft, business information hacking and virus attacks are the contemporary issues businesses are facing nowadays in the network communication and data transfer areas (Frederick, 2002). Furthermore, because of the increasing amount of intrusions the local networks and Internet have turned out to be uncertain, therefore, businesses more and more applying a variety of systems that monitor information technology security breaches (Sans, 2009).
Network intrusion as its name represents, attempts to recognize attempted or applied intrusions into network and to carry out proper actions for the intrusions. Intrusion detection includes an extensive collection of methods that differ on several axes. A few of these axes comprise: (Silberschatz, Galvin, & Gagne, 2004)
The time period that detection takes place: in real time (while it is taking place) or following the information only.
The types of input inspected to identify intrusive action. These could comprise user shell commands, process system calls, as well as network packet headers or contents. Several types of intrusions might be identified only by correlating information from various such sources.
The variety of action capabilities. Basic and straightforward types of actions consist of changing an administrator of the possible intrusion or in some way halting the potentially intrusive action, for instance, killing a course of action engaged in actually intrusive activity. In a complicated type of action, a system might clearly redirect an intruder’s action to a trap. A false resource exposed to the attacker with the aim of observing and gaining information about the attack; to the attacker, the resource appears real.
These levels of freedom in the design of space for detecting intrusions in systems have brought an extensive variety of solutions acknowledged as intrusions detection systems (IDS) (Silberschatz, Galvin, & Gagne, 2004).
Gem Infosys desires to protect the business network and organizational business resources. The main aim and objective of this policy is to offer procedures to set up security monitoring and intrusion detection to defend business resources as well as data on the organizational network. Gem Infosys policy is intended to protect both the privacy of business data that can be stored on the Gem Infosys computer as well as to shield the managerial network as of being infected through some hostile software that can be approached from the broadband connection to the Internet. This IDS policy as well cares for the business network access for different users in the corporate (Comptechdoc, 2009).
Scope
This Gem Infosys IDS policy covers each network host on the business network as well as the whole data business network comprising each path through which business data can travel. The main goal behind this policy implementation is to protect the system from the outer assaults on the corporate network. Also, another aim is to establish a security plan that addresses all the aspects of the security such as internal and external security management (windowsecurity, 2009).
IDS Policy Parameters
The main objective of the IDS policy for the Gem Infosys is:
1. Enhancing the security level internally and externally to the business.
2. Preventing un-authorized system entrance
3. Preservation of the business data
4. Establishing integrity of the business information
5. Establishment of appropriate security parameters to stop external intrusions
6. Permitting access only to authorized users
7. Detection and handling of any suspected network intrusion
Conclusion
This paper has presented detailed analysis of the IDS policy for the Gem Infosys. This paper has presented detailed overview of the different aspects and parameters of the IDS policy and operating structure. Through the implementation of this IDS policy Gem Infosys can protect the overall network form outer attacks.
Bibliography
Bradley, T. (2009). Introduction to Intrusion Detection Systems (IDS). Retrieved 09 28, 2009, from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm
comptechdoc. (2009). Intrusion Detection Policy. Retrieved 11 30, 2009, from http://www.comptechdoc.org/independent/security/policies/intrusion-detection-policy.html
Comptechdoc. (2009). Network Intrusion Detection. Retrieved 09 28, 2009, from http://www.comptechdoc.org/independent/security/recommendations/secintdet.html
Frederick, K. K. (2002). Evaluating Network Intrusion Detection Signatures, Part One. Retrieved 09 29, 2009, from http://www.securityfocus.com/infocus/1623
McHugh, J., Christie, A., & Allen, J. (2009). The Role of Intrusion Detection Systems. Retrieved 11 30, 2009, from http://docs.google.com/viewer?a=v&q=cache:JF9VTOoAi4kJ:www.cert.org/archive/pdf/IEEE_IDS.pdf+Intrusion+detection+system+policy&hl=en&gl=pk&pid=bl&srcid=ADGEESi9UDrh-HKO1pD6QhLg6kS-xxjGt6thfSESMGledGaFoFGyhKNRV34nX7VkHU1uBDM9KH7OEHTGldkX8CY8Q7YUEimxxdFmq0o
Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc.
Sans. (2009). Intrusion Detection FAQ: What is Intrusion Detection? Retrieved 09 28, 2009, from http://www.sans.org/resources/idfaq/what_is_id.php
Silberschatz, A., Galvin, P. B., & Gagne, G. (2004). Operating System Concepts (7th Edition). New York: Wiley.
windowsecurity. (2009). Intrusion Detection Systems (IDS) Part I - (network intrusions; attack symptoms; IDS tasks; and IDS architecture). Retrieved 11 30, 2009, from http://www.windowsecurity.com/articles/Intrusion_Detection_Systems_IDS_Part_I__network_intrusions_attack_symptoms_IDS_tasks_and_IDS_architecture.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IDS policy Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
IDS policy Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1560634-ids-policy
(IDS Policy Essay Example | Topics and Well Written Essays - 500 Words)
IDS Policy Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1560634-ids-policy.
“IDS Policy Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1560634-ids-policy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF IDS policy

Network Securty Hardware and IDS systems

...the packets invalid packets from moving on the LAN. A router not only checks for the valid destination address but also ensures the delivery of flawless packets to the destination. If a router finds any sort of error in a packet, it discards that packet and sends the remaining message to the destination. Therefore, we can say that a router is a very important data transfer device used on a network. Topic # 2 An Intrusion Detection System (IDS) is a software application, which not only detects and stops unauthorized activities but also reports them to the network administrators for further action. One of the most famous Intrusion Detection Systems is Snort, which is used to detect the presence of worms, malicious...
2 Pages(500 words)Research Paper

Traditional and Wireless IDS/IPS Techniques

Previously, firewall and other related monitoring tools were not sufficient to cater to the needs for efficient security architecture. Likewise, new and improved sensing technologies are now mandatory for any organization maintaining highly classified data. Consequently, IPS/IDS (Intrusion Prevention System / Intrusion detection system) are invented. They are derived from the traditional security appliances, and defined by the computer desktop encyclopedia, as a sensor “set up to detect illegal actions within the host. Most IDS programs typically use signatures of known cracker attempts to signal an alert. Others look for deviations of the normal routine as indications of an attack. Intrusion detecti...
5 Pages(1250 words)Research Paper

Policy

...decision in relation to their spending. They will minimize their spending to conform to the skewed budget. Therefore, the spending in the economy will drastically reduce. As a matter of fact, the economy will be losing since the money circulation in the economy is skewed to the budgets of the public workers. Social welfare policy The social welfare policy is controversial in that it deems to assist all the people in the society. This is done by the government talking some of the amounts of cash garnered from the rich people in the society to fend for the needs of the poor people in the society. To the poor people, this is a prudent approach in taking care of the welfare. The poor people are given grants...
9 Pages(2250 words)Essay

IDS Alert

...will also be checked for threats as there could be a possibility of infection in those PC's too. Any possible security event like this one will be reported to the assigned security officer. Any activity or breach of security policy is a security incident. A set of rules and procedures should be maintained when dealing with these kinds of security incidences. All the incidents that are mentioned as serious by the security officers will be at once conveyed and reported to all the top level management and the concerned authorities. Conclusion By reviewing the firewall and IDS logs it would give me the real picture of the scenario and will let me know the network activities that brought about this threat....
2 Pages(500 words)Essay

IDS Policy

...on the network unlike Host base IDS which are built for a single system. After confining the packets on the network they send it to the IDS console for inspection. Major vendors include Cisco and Symantec. Setbacks with IDS solutions As Gem infosys is a small software company having just 10 PC's and a broadband connection should not face much difficulty with the IDS system. But sometimes IDS solutions can bring out bogus alarms that may result in incorrect distribution of information. Inadequate potential and bad configuration choices are the major factors for this kind of problem. On the other hand many products need to be kept updated and well...
2 Pages(500 words)Essay

Security Network Intrusion detection system (IDS)

...Network Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network’s security. A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP address from accessing the network. Below is discussed a case study and important actions which become necessary in case of network intrusion. Case Study If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192.168.2.124 and the mouse pointer starts moving by itself, I would carry out the following steps. 1) The first and foremost thing is...
2 Pages(500 words)Essay

Public Policy- Environmental Policy

...Public Policy: Politics, Analysis, and Alternatives. The main purpose of this policy was to generate a framework that will encourage productive and harmonious coexistence between man and the environment that he exploits. The policy was to further promote programs that will prevent environmental and biosphere damage and promote health and man’s welfare .In addition, was to enable us understand the value of ecological systems as well as natural resources that are of great importance to the Nation and the world at large. The policy recognizes the interrelationship among the components of environment, and more so, the influences of population growth, urbanization,...
4 Pages(1000 words)Essay

Advantages and dis-advantages of IPS/IDS

...Advantages and Disadvantages of IPS/IDS Introduction: IDS or Intrusion Detection System is a system that enables detection of wrong, erroneous, or abnormal activity. It is generally used to detect whether a computer system has been intruded in any unauthorized manner or not. An IPS or Intrusion Prevention System is enables dynamically dropping data packets or cut off unauthorized connections. The present study focuses on the advantages and disadvantages of IPS/IDS. Advantages of Using an Integrated CISCO IPS/IDS Solution: Although snort performs detection and prevention of abnormal activities within a system, yet the benefits of Cisco IDS/IPS are more....
2 Pages(500 words)Essay

Policy

...Report on food safety program Introduction The main aim of agriculture department is to develop and execute a number of policies on behalf of the federal government in areas of agriculture, subsistence and commercial farming and forestry. The main objective of this department is to meet the need of all farmers and ranchers in all states. In addition, the department promotes agricultural trade both locally and internationally, develops and monitors programs on food safety as well as protecting natural resources in the country. Food safety has become an issue of concern to most people and households in the country due to the incorporation of the latest technology in farming and processing most farm produce. Hence, the...
4 Pages(1000 words)Essay

Monetary policy&fiscal policy

...Monetary Policy and Fiscal Policy Summary of the Monetary Policy Article Federal Reserve recognized that the rate of economic growth was not so fast and the central bank decided to continue purchasing bonds at the rate of $85 billion per month as offered in Fed’s program, as a way of stimulating the economy. Jim Zarroli from NPR in his explanation of whether the program has anything to contribute towards the direction of the economy declined to it having much contribution stating that the view of Fed in the economy is concerned about what has been for some time. He views this as being middling. He notes in relation to this, the high unemployment levels despite the improvement in the...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic IDS policy for FREE!

Contact Us