Running Head: CYBER SECURITY 1: Justification For Adding Intrusion Detection Software
Running Head: CYBER SECURITY 1: Justification For Adding Intrusion Detection Software
Student Name
Institution Name
Submission Date
Running Head: CYBER SECURITY 2
Content Description
Reasons why Intrusion Detection Software
(IDS) would benefit the company An intrusion detection system (IDS) would
benefit in terms to:
Screens system traffic for suspicious and
doubtful activities and issue a caution when
these actions are found.
Offer many advantages to associations,
commencement with the ability to tell apart
the security incidents.
Help categorized and break down the amount
and types of assaults and incidents
Data can be used by companies to enhance
their security frameworks or implement
efficiently successful controls.
Help the organizations to be able to
distinguish issues and bugs according to the
configuration of their network device. These
abilities would then be of great use for
organizations to evaluate future dangers
(Patel, Qassim, & Wills, 2010)
The categories and models of prevention Active and passive IDS, Network Intrusion
systems and intrusion detection. detection systems (NIDS) and host Intrusion
detection systems (HIDS) are the most significant
classification of IDS.
Active Intrusion Detection Systems
(IDS), also known as Intrusion Detection
and Prevention System (IDPS).
Interruption Detection and Prevention
Systems (IDPS) are designed in a way so
they can unsurprisingly block suspected
assault and there is no operator’s
mediation required for it to do so. A
passive IDS is a designed framework
which only monitors and then analyze
system traffic activity and if there is any
potential vulnerabilities for assaults and
attacks it alerts an administrator .
Network Intrusion Detection Systems
(NIDS), comprises of a sensor or a system
apparatus. That has a Network Interface
Card (NIC) that card works in
uncontrolled mode and also it has a
separate interface for management.
Host Intrusion detection system (HIDS)
Running Head: CYBER SECURITY 3