Question

In: Computer Science

Please explain NIDS in a little more depth. Also, who poses a threat to a business's...

Please explain NIDS in a little more depth. Also, who poses a threat to a business's physical and environmental security? Which do you think would be a bigger threat, people inside or outside of the organization? Why?


(Please Text format, no pictures or hand written).

Solutions

Expert Solution

---> A network-based intrusion detection system (NIDS) detects malicious traffic on a network. NIDS usually require promiscuous network access in order to analyze all traffic, including all unicast traffic.

---> NIDS are passive devices that do not interfere with the traffic they monitor.

---> The NIDS sniffs the internal interface of the firewall in read-only mode and sends alerts to a NIDS Management server via a different (ie, read/write) network interface.

---> Network-based intrusion detection systems (NIDS) are devices intelligently distributed within networks that passively inspect traffic traversing the devices on which they sit.

---> NIDS can be hardware or software-based systems and, depending on the manufacturer of the system, can attach to various network mediums such as Ethernet, FDDI, and others.

---> Oftentimes, NIDS have two network interfaces. One is used for listening to network conversations in promiscuous mode and the other is used for control and reporting.

---> With the advent of switching, which isolates unicast conversations to ingress and egress switch ports, network infrastructure vendors have devised port-mirroring techniques to replicate all network traffic to the NIDS.

---> There are other means of supplying traffic to the IDS such as network taps. Cisco uses Switched Port Analyzer (SPAN).

---> functionality to facilitate this capability on their network devices and, in some network equipment, includes NIDS components directly within the switch.

---> While there are many NIDS vendors, all systems tend to function in one of two ways.

NIDS are either signature-based or anomaly-based systems. Both are mechanisms that separate benign traffic from its malicious brethren.

---> Potential issues with NIDS include high-speed network data overload, tuning difficulties, encryption, and signature development lag time.


---> Security is very important to organizations and their infrastructures, and physical security is no exception. Hacking is not only way information and their related systems can be compromised.

---> Physical security encompasses a different set of threats, vulnerabilities, and risks than the other types of security we have addressed so far.

---> Physical security mechanism includes site design and layout, environmental components, emergrncy response readiness, training, access control, intrucion detection, and power and fire protection. Physical security mechanisms protect people, data, equipment, systems, facilitates, and a long list of company assets.

---> Physical security has a different set of vulnerabilities, threats, and counter measures from that of computer and information security.

The threts that an organization faces fall into many different categories.

* Natural environmental threats: Floods, earthquakes, storms and tornadoes, fires extreme temperature conditions, and so forth.

* Supply System Threats

* Manmade threats

* Politically motivated threats

---> Environmental security is the state of human-environment dynamics that includes restoration of the environment damaged by military actions, and amelioration of resource scarcities, environmental degradation, and biological threats that could lead to social disorder and conflict.

---> More companies are taking notice of the risks that insiders can pose to the company's data security today than in the past. Historically, the data breaches that make the news are typically carried out by outsiders.

---> While these breaches can cost hundreds of thousands of dollars (often millions more), outsider threats are generally the threats that have been addressed with traditional security measures.

--->  It's the threats that originate from inside that are much more difficult to prevent and detect using one-size-fits-all security measures.

---> Just one of the reasons that insider threats are more difficult to prevent stems from the fact that insiders don't always threaten the company's data security intentionally.

--->  In fact, many data breaches resulting from insider threats are completely unintentional.

---> To combat these risks, as well as the insider threats originating from those who do have malicious intent, a holistic approach to security is essential in the modern threat landscape – one that adequately addresses not only insider and outsider threats, but effectively manages both unintentional and intentional threats posed by those within your organization.


Related Solutions

Do firms reporting on their environmental and social impact poses more threat than benefits?
Do firms reporting on their environmental and social impact poses more threat than benefits?
In depth, please explain the significant importance of human capital.
In depth, please explain the significant importance of human capital.
please explain why business's transfer accounts payable to notes payable when the business can't afford to...
please explain why business's transfer accounts payable to notes payable when the business can't afford to pay the accounts payable.
What is target costIng? Please provide an in-depth explanation of its benefits to an organization. More...
What is target costIng? Please provide an in-depth explanation of its benefits to an organization. More specifically, the aerospace industry.
Why the Threat of substitutes on Air Asia is moderate? What are the factors? Please explain...
Why the Threat of substitutes on Air Asia is moderate? What are the factors? Please explain in at least 3 factors in more detail.
Please explain why the independence of central banks is important. And please provide a long/in depth...
Please explain why the independence of central banks is important. And please provide a long/in depth answer with supportive facts. Also, please (TYPE) everything.
please explain in depth: Explain what method is used to account for investments in equity securities...
please explain in depth: Explain what method is used to account for investments in equity securities with 20% to 50% ownership. Briefly describe how dividends received and share of net income are accounted for under this method
Discuss the shape of a protein and how this dictates function. Please explain in depth.
Discuss the shape of a protein and how this dictates function. Please explain in depth.
In-depth please explain the peer-review process, all steps, for publishing in BIOLOGY.
In-depth please explain the peer-review process, all steps, for publishing in BIOLOGY.
Please Explain In Depth Describe and discuss the leadership theory or style that makes the most...
Please Explain In Depth Describe and discuss the leadership theory or style that makes the most sense to you, regarding motivating personnel and achieving organizational goals. You are the Vice President of Operations. What are the steps to increase creativity among organization teams? (Provide specific examples that include team formation, team management style, and conflict resolution techniques.) What role does communication play in leadership and team building? Why is it often overlooked?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT