Question

In: Computer Science

An IDPS can be an invaluable tool if used correctly in the organization to minimize hacks....

An IDPS can be an invaluable tool if used correctly in the organization to minimize hacks. Using the Internet, search for commercial IDPS systems. In a written paper, answer the following questions:

  • What classification systems and descriptions are used?
  • How can they be used to compare the features and components of each IDPS?

Solutions

Expert Solution

As it is Chegg policy to answer one question per answer. Hence, I am answering the first question and request you to post the rest of the question individually. Thank you

What classification systems and descriptions are used?

  • IDPs also called Intrusion Detection and Prevention System are being used to secure the network from a different type of network vulnerabilities. There are multiple types and description which are being used to classify the system. They are as follows:
    • Knowing the type of intruders
      • In this classification, we need to classify the intruders whether they are external intruders or internal intruders.
      • The external intruders are the intruders which launch attack from outside the network and similarly, the internal intruders are the intruders that launch an attack from inside the network.
    • Knowing the type of intrusion
      • ​​​​​​​While classifying the attack it becomes very important to identify the intrusion type whether the attackers are penetrating the security system or is it some kind of DoS attack, etc.
      • It also covers whether the attack was due to any vulnerability that lies in the network or any leakage from the organization or the attacker is making use of any malicious attack.
    • From the detection techniques that are being used by IDPs
      • ​​​​​​​It also is classified based on the techniques which are being used by the IDPs in the network. There are namely three types of techniques. They are as follows:
        • Detection based on signatures
        • Detection based on anomaly-based detection.
        • Detection based on Stateful Protocol Analysis
    • From the type of IDPs used
      • ​​​​​​​They are also classified based on the type of IDPs that are being used by the network. They are as follows:
        • Network-based IDPs
        • Network Behaviour Analysis
        • Wireless based IDPs
        • Host-based IDPs

Hence, these are all the classification systems and descriptions that are being used for the classification of IDPs.


Related Solutions

Although the Internet can be an invaluable resource to all of us, there is also a...
Although the Internet can be an invaluable resource to all of us, there is also a dark side to this resource. In this discussion we’ll take a look at the many high-tech ways that people misuse technology. For the purposes of this discussion go to: Special Collection: Safety & Privacy in a Digital World http://www.vawnet.org/special-collections/TechSafety.php 1. Choose one of the following links and read all of the accompanying articles: Stalking/Surveillance Bullying/Harassment Child Sexual Abuse/Exploitation Sexting Social Media/Networking 2. Respond to...
How can information be used as a tool for or against governments?
How can information be used as a tool for or against governments?
Acc105 chapter 14 -What is a tool an organization can use to mitigate the disadvantges of...
Acc105 chapter 14 -What is a tool an organization can use to mitigate the disadvantges of a decentralized organization?
How can the provisions of the trust instrument be used as a planning tool?
How can the provisions of the trust instrument be used as a planning tool?
Employee Empowerment can have plenty of good benefits for the organization if managed and implemented correctly...
Employee Empowerment can have plenty of good benefits for the organization if managed and implemented correctly but how would you deal with employees making the wrong judgement call or having the "I am the boss" mentality?
A firm’s WACC can be correctly used to discount the expectedcash flows of a new...
A firm’s WACC can be correctly used to discount the expected cash flows of a new project when that project: will be financed with the same proportions of debt and equity as those currently used by the overall firm. will be financed solely with new debt and internal equity. will be financed solely with internal equity. has the same level of risk as the firm’s current operations. will be managed by the firm’s current managers.
Describe a tool or technique which can be used to analyse and improve the performance of...
Describe a tool or technique which can be used to analyse and improve the performance of manufacturing systems e.g. Rank-order clustering, Ishikawa diagrams, value stream mapping etc. and explain its basic principle, how it would be applied, the potential benefits and inhibitors to implementation.         
It can be argued that the greatest tool that humans have used for survival is culture....
It can be argued that the greatest tool that humans have used for survival is culture. Discuss how cultural tools in a particular time and place allowed us to adapt to, and change the, environment in order to survive. It's Human Evolution, Ecology & Adaptation Course.
Is CVP a tool that can only be used for companies that sell a single product?...
Is CVP a tool that can only be used for companies that sell a single product? Support your view.
What treatment approaches can be used to minimize the functional loss of brain due to strokes?...
What treatment approaches can be used to minimize the functional loss of brain due to strokes? Explain in your own words!
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT