Thursday, June 13, 2019

IDS Policy Essay Example | Topics and Well Written Essays - 500 words

IDS Policy - Essay ExampleThese corpses could be any workstation, server or other entanglement peripherals such as a router. The IDS system runs as a service or a process and has the ability to detect the network traffic on the host system. To save the system from past threats a threat signature database is present to make sure that the system is not vulnerable to those threats. Microsoft, Cisco and Tripwire etc. are some of the companies that megabucks in these IDS systems. (Spafford, Zamboni, 2000)2. Network Based IDS These are systems that confine and analyze packets on the wire. Network based IDS are used to protect the entire systems on the network unlike Host base IDS which are built for a single system. After confining the packets on the network they send it to the IDS console for inspection. Major vendors accommodate Cisco and Symantec.As Gem infosys is a small software company having just 10 PCs and a broadband connection should not face more than difficulty with the ID S system. But sometimes IDS solutions can bring out bogus alarms that may result in incorrect distribution of information. Inadequate potential and incompetent configuration choices are the major factors for this kind of problem. On the other hand many products need to be kept updated and well managed to avoid problems such as well updated sensors.Proc

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.