Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
5 Sources
Style:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

Module 3 Case: Security Technology Tools II

Research Paper Instructions:
SECURITY TECHNOLOGY TOOLS II Case Assignment Compare the functions, features and components of commercial IDPS systems. In writing your paper, use the classifications and descriptions you have learned from the reading materials as well as your own research in IDPS systems. Your paper should include the following: Types of IDPS systems Methodology each system uses Main functions of each system Discuss the use of honey pots and how they cause deception. Assignment Expectations Your paper should provide a summary of your findings from the assigned materials and any quality resources you can find. Cite all sources and provide a reference list at the end of your paper. The following items will be assessed in particular: Demonstration of your understanding of IDPS
Research Paper Sample Content Preview:
IDPS Systems Name: Instructor: Date: IDPS Systems When using one or several computing gadgets over a network, they can be vulnerable to attacks by malicious intrusions. It extends to devices like printers, ports, cables, discs, and information. To counter this, there is need to use a detection system. There are various ways to protect the computers and related connection from any of the attacks. They have to maintain the confidentiality, availability, and integrity of the system (Karen & Mell, 2007). In the computing industry, the type of protection method is famously known as Intrusion Detection and Prevention System (IDPS). They can be network-based or host-based systems. Here is an explanation of how these different systems work and how they can protect a system. Also discussed are honey ports and how deceptive they can be to intruders. Network based detection and intrusion systems have a card and a network interface card. To protect over a network, one must install a software known as an agent. Most are at the router edges where they can have a monitor of the traffic out and in (Karen & Mell, 2007). In case they detect malicious activities, they alert the administrator who will decide if the detection is a potential threat or not. Mostly, they use the extensive gathering of the same data which may be an alarm for a denied access or some scanning process (Jay, Baker, & Joel, 2007). For a wireless network, they monitor the protocols and minimize problems that may arise because of varying topology and monitoring abilities. Advice is given to security administrators to look for all the potential attacks which come in different manners. Host-based are installed in the computers or together with operating systems and collects information coming in out. They then raise an alarm when they detect malicious activities. They have a limited ability which covers only the computers in which they are installed. The events collected like call sequences and logins that will help identify any connections to intrusions. Mostly, they apply to chosen critical servers. To monitor several computers, more installations may work (Karen & Mell, 2007). It is wise to have an intrusion detection system that will be able to analyze several computers with much ease. The difficulty arises if the operating systems are different. Attackers can also find it easy to attack this system and disable the intrusion detection system. A comparison of the two types of intrusion detection and prevention systems will bring in differences that will help analyze which can help a network better. To achieve this, the types of operating systems are understandably different. There are many computers in a commercial s...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Research Paper Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!