logo

Information and System Security Research Paper 2022

This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week's assigned Learning Resources. In Unit 6, you will use a variety of resources. This page outlines the resources that you will need to participate in the Discussion and to complete the Assignment.

4 Pages765 Words7 Views
   

Added on  2022-10-04

Information and System Security Research Paper 2022

This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week's assigned Learning Resources. In Unit 6, you will use a variety of resources. This page outlines the resources that you will need to participate in the Discussion and to complete the Assignment.

   Added on 2022-10-04

ShareRelated Documents
Running head: INFORMATION AND SYSTEM SECURITY
1
Information and System Security
Student Name
Institution Affiliation
Information and System Security Research Paper 2022_1
INFORMATION AND SYSTEM SECURITY
2
Information and System Security
Technology continues to advance in the contemporary world. Technology has impacted
nearly all aspects of human life. Information and system security concern is a current trend all
over the world as the result of the wide adoption of technology in our day to day technology
(Soomro, Shah, and Ahmed, 2016). This paper is a critique of a host-based intrusion detection
system and how attackers can bypass them and attack users within the system. Business
organizations should ensure information and system security for efficient operation without
disruptions.
A host-based intrusion detection system (HIDS) detects intrusion and misuse in a system by
monitoring the activities of the computer system. Once the intrusion is detected, the event is
logged, and the responsible authorities are notified. HIDS system monitors and analyzes both the
internal and external activities to ensure that the security policy of the system is not breached. In
a world where cyber-attacks are a threat to many organizations and individuals, HIDS is a handy
tool.
HIDS systems are associated with various information and system security advantages. First, the
system monitors the system's activities. This achieved through the host-based IDS sensor to
monitor user and file access activities. The system controls the access of files, installation of
executables in the system, and manipulation of data. Secondly, HIDS verifies the failure or
success of an attack. HIDS uses logs of activities. Thus it can be used to document whether an
attack occurred in the computer system or the HIDS prevented it. HIDS sensors come at a
cheaper cost compared to the network based IDS sensors. Additionally, HIDS can detect attacks
that network-based intrusion detection systems (NIDS) fail to recognize (Chawla, Lee, Fallon,
Information and System Security Research Paper 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(Doc) Intrusion Detection System
|10
|2535
|219

Intrusion Detection System PDF
|6
|966
|48

ANALYTICAL RESEARCH PROJECT BASED ON INTRUSION DETECTION
|15
|3904
|5

MN692 Capstone Project (pdf)
|20
|4252
|34

Information Management: Intrusion Detection, Firewalls, and Operating System Security
|4
|778
|289

Assignment on Network Intrusion Detection System
|2
|364
|30