logo

Information Technology Security Management Report 2022

   

Added on  2022-10-18

10 Pages2743 Words18 Views
Running head: REPORT ON INFORMATION TECHNOLOGY SECURITY MANAGEMENT
REPORT
ON
INFORMATION TECHNOLOGY SECURITY MANAGEMENT
Name of the Student
Name of the University
Author Note:

IT Security Manegement1
Introduction:
Purpose of this report is to discuss about the application of intrusion detection system
into any information technology organization as it has been significantly proven that there is
huge necessity of IT security into any IT enabled organization. Followed by the above aspect
it has been also noticed that considering the current security threats in IT organizations, it has
been detected that information technology security provides effective protection to the IT
devices which will restrict the unauthorized access as well as the possibilities of getting
attacked by the other cyber security threats (Bada, Sasse & Nurse 2019). Hence, considering
this above aspects this report will consist a detail elaboration on why IDS has been
introduced in the cyber security field. Along with this it will also discuss about the
classification of the Intrusion Detection System as well as the IDS mechanism. Lastly, it will
conclude by stating the future application of IDS which may have the ability to enhance the
security procedure of an IT enabled organization.
Background:
Followed by the aspect of providing protection to the IT enabled organizations, it can
be stated that data security or the aspect of IT security can be obtained by providing effective
protection to the information or the information technologies of the an organization where
there is significant possibilities of getting attacked by external threats due to which the
information related to the organization as well as the stakeholders (Amini et al., 2015).
Considering the aspect of information loss it has been noticed that it is now highly essential
to address the IT security threats with effective IT security applications as while investigating
the essentiality of IT security it has been noticed that the hackers are getting more dangerous
which holds a major impact of the protecting the digital assets as well as it protects the
information network devices. Hence, with the purpose to protect the digital data and other IT
assets present in an IT enabled organization the application of intrusion detection system has

IT Security Manegement2
been introduced which has offered several impactful features that has the ability to reduce the
possibilities of getting attacked by external threats (Ben-Asher & Gonzalez 2015). Intrusion
Detection System is such system, which is effective for the IT enabled organization with the
purpose to monitor the network traffics, followed by which IDS will aware the organization
about the determined suspicious or unusual activities in order to take possible action to
reduce the chances of getting hacked. Followed by the above mentioned application it also
analyses the outbound network as well with the purpose to identify and indicate the unusual
activities present in that selected organization (Cherdantseva et al., 2016).
Classification of Intrusion Detection System:
While analyzing the application of Intrusion Detection System it has been noticed
that, IDS has four classifications based on its analyzed activity and detection method. A detail
elaboration on those identified classifications are described below-
Analyzed Activity-
Followed by the application as well as the offered feature of Intrusion detection
system into the IT enabled organization, the IDS has been classified into two which includes
the Network Based Intrusion Detection (NIDS) and the Host Based Intrusion Detection
System (HIDS) (Fielder et al., 2016). A detail elaboration of above mentioned IDS types are
mentioned below:-
Host Based Intrusion Detection System (H-IDS)-
After analyzing the application of Intrusion Detection System into the organizational
network as well as in the IT infrastructure it can be stated that the only aim of an Intrusion
Detection System is to identify, gather and alert the organization about the unauthorized
access that has taken place onto the IT infrastructure and into the network servers as well.
Considering the above feature of IDS a Host Based IDS works by executing an effective

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Project Dissertation Proposal: Next Generation Cybertrap
|12
|4471
|188

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27

Cyber Security - Assignment PDF
|8
|2242
|71

Next-Generation Cybertap For Corporate Intrusion Detection
|10
|4380
|172

(Doc) Intrusion Detection System
|10
|2535
|219

A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization Presentation 2022
|7
|6793
|26