Review article - cyber security vulnerabilities

Assignment Help Software Engineering
Reference no: EM132173435

Review this article with 2 APA format references.

In this day and age technology continues to advance at an alarming pace and with it an increase in the amount of cyber security vulnerabilities. A software or hardware intrusion detection system attempts to monitor and provide early detection of suspicious or malicious activity on weak and vulnerable hosts.

This line of defense is a necessity for any corporation to protect its assets and personnel. Intrusions detection systems (IDS) can be broken down into two distinct groups: network based and host based. To be most effective, a network based IDS (NIDS) must be tactically positioned within a network to be able to identify attacks that happen on hosts of that particular network.

Capturing the data normally requires placing sensors, or "taps", at the entrance and exit points of the network as it traverses to and from the wild dirty Internet (Mamun, 2012). There are several advantages to utilizing a NIDS. NIDS are relatively easy to deploy as they are not dependent upon a specific infrastructure or operating system. Having no requirement for software at the host level also reduces the overall cost of the system once it''s installed on the network.

NIDS are able to detect malicious activity in real time, respond accordingly, and retain the data for forensic analysis. Some disadvantages of the NIDS include: frequent amount of false positives highly susceptible to protocol based attacks continual updates to signature library to remain relevant Host based intrusion detection systems (HIDS) run on software that has been installed on individual hosts that monitor traffic coming in and going out from that specific host (Rouse, 2008).

HIDS also monitor the file structure of the host it''s installed on looking for changes to the audit and event logs. It compares any changes to known attack signatures and alerts the management console if a match is identified which makes it very useful in identifying if an actual attack took place. Because HIDS are software based, they do not require any supplementary hardware. One of the biggest disadvantages of utilizing a HIDS is that they are vulnerable to any attacks against the host operating system.

If the host operating system is compromised then the HIDS is as well. HIDS also takes up sizable amounts of hard disk space and can negatively affect system performance overhead due to amount of resources it consumes while running (Stallings, 2007).

References Mamun, S. (2012). Host based IDS vs Network based IDS.

Host-based and Network-based Intrusion detection systems.

Introduction to network-based intrusion detection systems.

Verified Expert

A software or hardware intrusion detection system attempts to monitor and provide early detection of suspicious or malicious activity on weak and vulnerable hosts. This line of defense is a necessity for any corporation to protect its assets and personnel. Intrusions detection systems (IDS) can be broken down into two distinct groups: network based and host based. To be most effective, a network based IDS (NIDS) must be tactically positioned within a network to be able to identify attacks that happen on hosts of that particular network. Capturing the data normally requires placing sensors, or “taps”, at the entrance and exit points of the network as it traverses to and from the wild dirty Internet. This paper is written in Microsoft Word Document File.

Reference no: EM132173435

Questions Cloud

Profitmaximizing output and advertising levels : What are the profitmaximizing output and advertising levels? What are the profits?
What is the economic life of the press : The College Park Sheet Metal Works (CPSMW), a very profitable Maryland corporation, purchased a press for $18,000. The annual operating and maintenance costs.
What is the total profit per week : You have 100 identical customers each with the relevant demand function Q=20-P (where Q is the hours per week and P is the per hour fee)
Calculate the economic life of the system : Transport International Incorporated (TII) is purchasing a new heavy-duty tractor-trailer truck for $250,000 and installing some special equipment on it.
Review article - cyber security vulnerabilities : Identify attacks that happen on hosts of that particular network - technology continues to advance at an alarming pace and with it an increase in the amount
What kinds of systems are described in this case : What kinds of systems are described in this case? Identify and describe the business processes each supports.
Offshoring verses not offshoring : What do you think about the debate in the text that addresses, “Offshoring Verses Not Offshoring”
Will there be any rural-urban migration as things stand : Urban modern/formal sector employment can be obtained with a 0.25 probability and pays $5 per day. The urban traditional/informal sector pays 80 cents per day.
Increased interest in entrepreneurship : Will the increased interest in entrepreneurship cause difficulties for companies that require a traditional workforce?

Reviews

Write a Review

Software Engineering Questions & Answers

  What are benefits and challanges to adapting new technolgy

Why is change the biggest challange to a system administrator?

  Explain deployment of a product are the first steps

The design, development, and deployment of a product are the first steps toward a finished product ready for distribution in the marketplace. The next step is the evaluation of the user experience in order to gather data on the usability of the pr..

  Write review on article - electronic banking establishments

Write review on article with references with APA format - Electronic Banking establishments have become an indispensable component of global economies

  Senior management at your company is concerned about why

read the following scenario senior management at your company is concerned about why so many software development

  Explain how enterprise software works

Define an enterprise system and explain how enterprise software works. Select one type of Enterprise system and describe how it helps businesses achieve operational excellence

  Identify two techniques you would use

Discussion: "Fact-Finding Techniques"- Identify two techniques you would use and state the advantages and disadvantages of each.

  Changes in the labor market

Historically, the introduction of technology has caused profound changes in the labor market and, temporarily at least, displaced people from jobs.

  How the xml equivalent capabilities were used

Write a short essay to discuss how the XML equivalent capabilities were used in the past in WBIS and what changes are expected in XML in future?

  Use case diagram with activity diagram for each use-case

Use case diagram with activity diagram for each use-case - ER or class diagram

  Develop a dtd for catalog of cars

Develop a DTD for a catalog of cars, where each car has child elements make, model, year, color, engine, number_of_doors, transmission_type, and accessories.

  How knowledge is important in your system

Write an introduction to your chosen knowledge-based system for healthcare centre

  What is the process of software design

What is the process of software design. What tools are used in software design.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd