logo

Networking and Security

   

Added on  2022-10-12

4 Pages801 Words57 Views
Running head: NETWORKING AND SECURITY
Networking and Security
Name of the Student
Name of the University
Author Note

NETWORKING AND SECURITY
1
How effective are companies and other organizations at applying IDS for
specific purposes?
Owing to the widespread integration and deployment of intrusion detection by the
industry, the importance of intrusion detection systems or IDS as integral parts of the
organization’s infrastructure is becoming more apparent. Medium to large organizations as
well as government institutes are deploying enterprise grade IDS solutions (Javaid et al.,
2016). As they begin towards rolling out and administering their IDS, businesses are starting
to experience several obstacles in regards to data collection, management, deployment as also
data correlation. Intrusion detection systems or IDSs are to identify anomalies in the network
and yet it still has low detection rates and higher false alarm rates especially with anomalies
having few records.
Find and summarize an example of ways IDS tools or techniques are used
in computer forensics.
Organizations cannot totally depend upon IDS in maintaining security of their network.
Hence the network administrators additionally need to perform investigations using audit
tools to analyse the network events in their entirety and to restore the network when affected
and disabled by different threats and attacks. The outcomes of IDS tools can vary based on
the type of IDS used. These outcomes include skills of reacting in prompt manner for
preventing or even reducing damages significantly through automated or manual
intervention, skills of identifying attackers or attack activities that may cause further damages
in time as also skills of discovering newer patterns of attack for measuring the threats so as to
grow measures to protect the systems from these threats. Snort for example saves several
messages in the /var/log/snort directory (Mualfah & Riadi, 2017). The messages can contain
important information regarding any incidents as soon as they occur based the rules that are

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Justification for choosing Snort as IDS
|4
|708
|101

Demonstration of Network Security Tools
|10
|2109
|85

Intrusion Detection System and Snort: A Comprehensive Guide
|8
|857
|312

Cyber Security Detection of Common Attacks Using SNORT Project 2022
|56
|14273
|14

THE SECURITY OF NETWORK
|11
|1870
|16

Information Management: Intrusion Detection, Firewalls, and Operating System Security
|4
|778
|289