logo

Information Management: Intrusion Detection, Firewalls, and Operating System Security

Identifying components of an intrusion detection system, explaining basic principles of an IDS, describing different detection mechanisms, distinguishing between host-based, network-based, and distributed IDSs, and presenting an overview of the Snort IDS.

4 Pages778 Words289 Views
   

Added on  2023-06-07

About This Document

This article discusses Intrusion Detection, Firewalls, and Operating System Security in Information Management. It explains the components of Intrusion Detection System and Firewall filter options. It also provides strategies guided by the Australian Signals Directorate (ASD) for Operating System Security. The article is relevant for students studying Information Management and related courses.

Information Management: Intrusion Detection, Firewalls, and Operating System Security

Identifying components of an intrusion detection system, explaining basic principles of an IDS, describing different detection mechanisms, distinguishing between host-based, network-based, and distributed IDSs, and presenting an overview of the Snort IDS.

   Added on 2023-06-07

ShareRelated Documents
Running head: INFORMATION MANAGEMENT
Information Management
Name of the Student
Name of the University
Author Note
Information Management: Intrusion Detection, Firewalls, and Operating System Security_1
1INFORMATION MANAGEMENT
Intrusion Detection
It is a service that maintains the security of a system through the help of surveillance
and analysis of the events in the system. It is mainly done for detecting out and supporting the
system with real-time or tending to be real-time warnings of the unauthorized access to the
valuable resources of the system. The components of the system include a collection of the
sensors, analyser and user interface. The detection mechanism is of two types namely
Anomaly Detection and Signature/Heuristic Detection. The Intrusion Detection System (IDS)
is categorised into Host-based IDS (HIDS), Network-based IDS (NIDS), and Distributed or
hybrid IDS (Liao et. al., 2013). These three types of Intrusion Detection System helps in
providing with the best support for the security services to detect out the malicious intrusions.
One example of IDS architecture is the Snort System. It can be open-source host-based or
network-based or distributed IDS. The Snort system uses a decoder to detect the packets and
sends it to the detection engine from where an alert is generated during the login procedure.
Firewalls
In general, terms Firewalls are meant for detecting out the breakage of fire and to
prevent the fast spreading out of a fire. In technological terms, the computer firewalls aids in
protecting a particular zone of the network from several attacks that are spread from the other
zones of the network. The computer firewalls are composed of the firewall filter options
(Khoumsi, Krombi & Erradi, 2014). These filter options are the IP address and protocol
values, the Application protocol, the User identity and the Network activity. The firewalls are
useful in providing the system with the minimum security, as the firewalls are unable to
prevent attacks that bypass the firewalls. It is convenient in a small area of service where the
number of attacks and the internal threats is less. The Demilitarised (DMZ) zone networks
require a combination of an external firewall along with an internal firewall because these
Information Management: Intrusion Detection, Firewalls, and Operating System Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Introductionto Information Assurance and Information Security Assignment 2022
|7
|483
|22

Demonstration of Network Security Tools
|10
|2109
|85

Justification for choosing Snort as IDS
|4
|708
|101

Difference between Firewall and Intrusion Detection System
|4
|454
|21

MIT141559 IT Security Assignment: Networking Intrusion Detection Systems
|6
|1185
|131

Penetration Testing and Intrusion Detection Name of the University Author
|57
|5094
|316