Question

differentiate between the different types of intrusion detection systems and explain their uses. Describe optimum locations...

differentiate between the different types of intrusion detection systems and explain their uses. Describe optimum locations for IDS on a corporate TCP/IP network and explain how IDSs can be used to complement firewalls.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution:

_________________________________________________________________________________

different types of intrusion detection systems :-

Network intrusion detection system (NIDS)
Host-based intrusion detection system (HIDS)
Perimeter Intrusion Detection System (PIDS)
VM primarily based Intrusion Detection System (VMIDS)
Uses:-

A firewall is associate intrusion detection mechanism. Firewalls square measure specific to associate organization’s security policy. The settings of firewalls is altered to createpertinent modification to the firewall practicality.
Firewalls also can block email services to secure against spam.
Firewalls square measure wonderful auditors. Given lots of disk or remote workcapabilities, they will log any and every one traffic that passes through.
---------------------------------------------------------------------------------------------------------------------
--> Firewalls cannot answer malicious activity; they see solely host addresses, network addresses, and ports, then either permit or deny connections. IDSs do answer malicious activity, however i have not seen associate IDS that deals with network control higherthan a firewall will.

--> Some IDSs can respond by making economical, pertinent, and accurate security-event reports that usually embody totally different warning levels. additionally to security-event reports, some IDSs also can kill the association, log the session, alarm through visual alarms, and remote notification via email or pager messags

Add a comment
Know the answer?
Add Answer to:
differentiate between the different types of intrusion detection systems and explain their uses. Describe optimum locations...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Network Security The need for intrusion detection systems (IDS) and intrusion prevention systems (IPS) and how...

    Network Security The need for intrusion detection systems (IDS) and intrusion prevention systems (IPS) and how they can effectively be used in a network operations setting?

  • Intrusion detection systems have fundamental flaws in their designs and functionalities. Intrusion detection does not necessarily...

    Intrusion detection systems have fundamental flaws in their designs and functionalities. Intrusion detection does not necessarily prevent intrusions. As more organizations encrypt traffic, it becomes increasingly difficult to track intrusions because IDSs have no capabilities to examine encrypted traffic and are, therefore, unable to recognize problems and create alerts. Engineers rely heavily on IDSs to fight hackers. If configured improperly, the IDS will generate false positive alerts, which can be disastrous to the organization. Too many alerts can cause security...

  • 7-Explain the different network categories (LANs and WANS) 8-Explain topology and the different types found in...

    7-Explain the different network categories (LANs and WANS) 8-Explain topology and the different types found in networks. 9-Identify the different physical media types found in networks. 10-Differentiate the protocol between a circuit based telephone network and how the Internet works. 11-Describe the different wireless networks we use (think of your phones) 12-How is the focus of CRM systems different than SCM and ERP systems.

  • The senior systems analyst has tasked you to conduct a briefing on the different types of...

    The senior systems analyst has tasked you to conduct a briefing on the different types of firewalls. In this briefing, you must show a diagram of where on the LAN the firewalls are placed on the network. Utilize the following guidelines to create your PowerPoint presentation: One slide will consist of a LAN diagram of the location of a firewall. The other three slides should describe the types of firewalls. Utilize the Notes section of the slides to explain phases...

  • Based on your findings, compare and contrast the different types of malware detection methodologies. Explain how...

    Based on your findings, compare and contrast the different types of malware detection methodologies. Explain how you would deploy and maintain IDS with up-to-date signatures, changes in traffic patterns, and deviations that are common on computing infrastructures.

  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • Chapter 11: Describe the three typical locations for service firms. Briefly summarize low customer contact businesses....

    Chapter 11: Describe the three typical locations for service firms. Briefly summarize low customer contact businesses. Describe the key issues in leasing. Differentiate manufacturing layouts from retail store layouts. Define sales promotion and briefly describe the four major techniques used in sales promotions. Chapter 12: What are the limitations of a balance sheet? Describe the mechanics of a cash flow statement. Briefly explain cost-volume-profit (CVP) analysis. Briefly discuss the different types of budgets that make up the master budget. What...

  • Explain the difference between passive and active attacks on a network. Give an example of each....

    Explain the difference between passive and active attacks on a network. Give an example of each. Which headers are left in plaintext when we use link encryption? Network encryption? Application encryption? How is end-to-end encryption different from other types of encryption? At what layer does it take place? Describe the SSL key negotiation in terms of the keying techniques introduced in Section 14.2. Explain how the different IPsec modes apply encryption either above or below the IP layer Describe WEP2...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT