StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Securty Hardware and IDS systems - Research Paper Example

Cite this document
Summary
Topic # 1 The hardware device, which I have selected for discussion is a router. A router is a device, which operates at the network layer of the OSI model. It is used to transfer data from source to destination by forming a connection between different networks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Network Securty Hardware and IDS systems
Read Text Preview

Extract of sample "Network Securty Hardware and IDS systems"

Topic The hardware device, which I have selected for discussion is a router. A router is a device, which operates at the network layer of the OSI model. It is used to transfer data from source to destination by forming a connection between different networks. A router makes use of a configuration table to decide whether it should allow sending of a packet or not. A router establishes an appropriate and valid path for the packet that a source computer sends to a desired destination. A configuration table includes information on which connections lead to particular groups of addresses, connection priorities, and rules for handling the traffic (Franklin, n.d.).

Routers have a built-in mechanism, which ensures LAN protection by blocking the packets invalid packets from moving on the LAN. A router not only checks for the valid destination address but also ensures the delivery of flawless packets to the destination. If a router finds any sort of error in a packet, it discards that packet and sends the remaining message to the destination. Therefore, we can say that a router is a very important data transfer device used on a network. Topic # 2 An Intrusion Detection System (IDS) is a software application, which not only detects and stops unauthorized activities but also reports them to the network administrators for further action.

One of the most famous Intrusion Detection Systems is Snort, which is used to detect the presence of worms, malicious activities, and unauthorized accesses. Haas (2010) states, “Snort is a libpcap-based packet sniffer/logger which can be used as a lightweight network intrusion detection system”. People make use of Snort software to detect the hacking attempts on their networks. Snort examines every packet that a computer transfers over a network and reports transfer of suspicious packets to the administrators.

Snort software manages a database in which it keeps all traffic signatures. Whenever a computer sends a packet over a network, Snort finds the MAC address of that packet in the database. In case a match is found, snort configures the rules to take the required actions. Topic # 3 In this part, we will discuss honeypots, which are used as a security tool to detect encrypted attacks and online credit card frauds. This highly flexible and reliable security tool not only detects attacks but also prevents the attacks and gathers in-depth information about the attack and the hacker.

Honeypots have two basic types, which include production honeyputs and research honeyputs. Companies and corporations use production honeyputs whereas military and government institutions use research honeyputs. One of the key advantages of honeypots is that they trap the hackers by making them fool. Hackers think that they have reached the desired network whereas in actual, they are trapped in a honeypot. Some other advantages of honeypots include capturing bad activities, capturing hackers using new tools and tactics, use of minimal resources, encryption in IPv6 environments, and simplicity (Spitzner, 2003).

Some of the disadvantages include capturing only directly interactive activities and presence of hijacking risks. References Franklin, C. (n.d.). How Routers Work. Retrieved from http://communication.howstuffworks.com/convergence/router2.htm Haas, J. (2010). Snort. Retrieved from http://linux.about.com/cs/linux101/g/snort.htm Spitzner, L. (2003). Definitions and Values of Honeypots. Retrieved from http://www.tracking-hackers.com/papers/honeypots.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network Securty Hardware and IDS systems Research Paper”, n.d.)
Retrieved from https://studentshare.org/other/1411945-network-securty-hardware-and-ids-systems
(Network Securty Hardware and IDS Systems Research Paper)
https://studentshare.org/other/1411945-network-securty-hardware-and-ids-systems.
“Network Securty Hardware and IDS Systems Research Paper”, n.d. https://studentshare.org/other/1411945-network-securty-hardware-and-ids-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Securty Hardware and IDS systems

Surveillance Security

There are no definitions available for video surveillance security apart from this one that states it, as “Intelligent Video Solution is a system of hardware and software that aids the security executives in performing their daily tasks.... An intelligent video solution can be from a single manufacturer or it can be a compilation of components (both hardware and software) from a variety of manufacturers.... This paper ''Surveillance Security'' tells that In this global technological evolution of information systems, every organization protects the network by firewalls, intrusion detection systems etc....
7 Pages (1750 words) Essay

Network Security-Intrusion Detection System

The essay "Network Security-Intrusion Detection System" will try to look at the two processes Host-based and Network-based Intrusion Detection systems, how effective these two approaches for the Intrusion Detection system for any organization and will also cover various guidelines for Intrusion Detection systems deployment, operation, and maintenance.... Also various types of intrusion detection systems, mainly the Host and Network-based intrusion detection system covered in this paper....
16 Pages (4000 words) Essay

Device Hardening and Secure Network Design

This paper presents the hardening and secure network design analysis.... The objective of this research is to present a detailed analysis of the secure network design.... Access control lists (ACLs) could be configured to authorize or refute UDP and TCP network traffic.... Additionally, the firewalls are implemented for additional in-depth examination; tactically positioned router ACLs thus they augment network security.... At present, network security has become the most important subject of discussion....
12 Pages (3000 words) Term Paper

Designing Networks in Waxlow Private School

The network will use the latest technology in terms of both hardware and software.... The hardware technology implementation includes Cisco routers, switches and 'access points'.... nbsp;… As the paper highlights, the campus area network connects with two or more networks of the educational institutes, universities or corporate campus.... The network devices and computing pieces of equipment have to be reliable and extendable, if the faculty staffs increases....
28 Pages (7000 words) Research Paper

Information Technology: Surveillance Security

In order to protect the computer network, organizations emphasize on implementing hardware and software application as well as a framework in terms of surveillance security.... Consideration is given to IP camera-based surveillance systems, biometric systems for attendance employee activity… The report concludes prevention of physical theft by incorporating surveillance IP based cameras.... A definition associated with information and communication technology will demonstrate the concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing the Internet for concealed communication (network Security....
8 Pages (2000 words) Assignment

Network-Based Intrusion Detection System

hellip; Biometric systems will also be incorporated at the entrance/exit of the critical department for tracking employee existence and activity.... For detecting potential and current threats, intrusion detection systems will be considered.... In this global technological evolution of the digital era, every organization protects digital data by deploying hardware or software-based firewalls, security appliances such as intrusion detection systems, and other dedicated hardware....
8 Pages (2000 words) Report

Network and Communication Security Protocols

Incorporation of an Intrusion detection system (ids) is compulsory as it will penetrate deep in the network and detect unknown activities related to unauthorized access, viruses and hacking.... There are many types of ids, the recommended ids is an anomaly-based ids.... The functionality of an anomaly-based ids involves the creation of profiles associated with normal behavior and activities within the network....
31 Pages (7750 words) Research Paper

Storage System, Servers and Desktops, Client Operating System, and Network Security

Electronic Record-Keeping systems Procedures should be put into place to ensure that confidential records are properly restricted.... An intrusion detection system (ids) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.... hellip; An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us