Your organization’s business manager has read an article about how intrusion det
ID: 3850013 • Letter: Y
Question
Your organization’s business manager has read an article about how intrusion detection/intrusion protection systems can help deter hackers.
He or she wants to spearhead a campaign to deploy them around the company’s locations in three states.
Since an IDS can help deter hackers, does this make it a worthwhile project, or is there some reason to be wary?
Specific to this example, how do you respond to ad hoc security requests like this?
In general, how can you keep requests like this in check, or should you?
Explanation / Answer
First be sure to have a tool in place to analyze network traffic most importantly near the edge of the network. the leading free IDS software available althrough commercial version of snort are now available as well. where a snort-equipped computer will be running
An IDS specifically looks for suspicious activity and events that might be result of avirus, worm or hacker. This is done by looking for known intrusion signatures or attack signatures that characterize different worms or viruses and by tracking general variances which differ from regular system activity.
The term IDS actually covers a large varity of products for which all produce the end result of detecting intrusions.An IDS solution can come in the form of cheaper shareware or freely distributed open source program.
Ad Hoc BPs request this workflow contains five tabs each with a different functionality.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.