logo

System Security | Assignment - 1

   

Added on  2022-10-04

11 Pages2346 Words20 Views
Running head: SYSTEM SECURITY
SYSTEM SECURITY
Name of the Student
Name of the University
Author Note

1SYSTEM SECURITY
Executive Summary
The report deals with the firewall and the intrusion detection system that are used for the
security of the internet. The report focuses on the improvement of the real time system
security of a system that is integrated with the assistance of intrusion detection system, IPS,
firewall and honey pot. The report discusses about the development history of intrusion
detection system and honey pot. Lastly, the report focuses on the differences between firewall
and intrusion detection system and the diagrams of the components of firewall and intrusion
detection system. The report concludes with an understanding of the network security using
the intrusion prevention system, firewall and the intrusion detection system.

2SYSTEM SECURITY
Table of Contents
Introduction................................................................................................................................3
Discussions.................................................................................................................................3
Improvement of System Security...........................................................................................3
Development history of IDS and Honey pot..........................................................................5
Difference between IDS and Firewall....................................................................................6
Conclusion..................................................................................................................................8
Bibliography...............................................................................................................................9

3SYSTEM SECURITY
Introduction
Security system is a system of hardware that prevents the intrusion that is
unauthorized into premises and then reports the attempts. A software system that is similar
and that prevents the entry that is unauthorized. There are different types of security systems
that are used such as the monitored systems, unmonitored systems, electric current home
alarm and the wireless alarm systems. The report deals with the firewall and intrusion
detection system that are used for the security of the internet. The report focuses on the
improvement of the real time system security of a system that is integrated with the assistance
of intrusion prevention system, Intrusion Detection System, firewall and honey pot. The
report discusses about the development history of intrusion detection system and honey pot.
Lastly, the report focuses on the contrast between the firewall and intrusion detection system
and the diagrams of the components of firewall and intrusion detection system.
Discussions
Improvement of System Security
The challenges for the companies in this era are to meet the requirements of security.
The methods for logging data, prevention of intrusions and detection of the intrusions have
been evolving for years. The integrated system has been established by considering the
requirement analysis of the framework of engineering, implementation, design and testing.
For the Intrusion prevention system tool that is open source known as snort is arranged in a
mode that is inline, so the sensors that are present captures the packets and then drops them in
case of any of the activity that is suspicious is seen. The signatures for the detection and the
prevention systems help the intrusion prevention system to alert the administrator and then
dropping the packets. The logging of the packets that are dropped is done using the software.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Project - Security Technology Controls and Strategies
|9
|797
|371

Introduction to Network Forensics
|5
|968
|73

Network Security
|14
|3555
|412

Effectiveness of Intrusion Detection System in LAN Network
|8
|2383
|95

Implementation of Different Firewall Technologies: Advantages and Disadvantages
|6
|2344
|50

Firewalls
|17
|1394
|368