Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computers » Article
 

Intrusion detection guide




By Mansi gupta

With the growing use of internet the threats attached to it are also growing. As more and more people are getting dependent on internet, the hackers are inventing new ways to intrude into their systems and cause havoc for them. By intruding or by gaining unauthorized access to their computers the hackers can access confidential information or can simply destroy their system and derive sadistic pleasure out of it. Thus, Intrusion Detection Systems (IDS) have become the need of the hour.


The large number of computers accessing internet and the valuable information they contain has made it the quintessential task to ensure network security before establishing any kind of network. Hackers can adopt different methods to breach the network security. Most common of them is by gaining unauthorized access to the information that is primarily private and confidential. This is very dangerous for a network as this information can be misused or can be modified by the hacker, which is also known as data diddling. This kind of modification of data can render all the data stored on the computers that are connected to a network, to become useless. Thus, it can result in total chaos and disorder for any organization or individual. Some hackers may even delete the data totally or may release a virus in the network that can corrupt all the files on the computers including those of the operating system, which can render a computer to be totally useless. Some other forms of network security threats are remote login capability, SMTP hijacking, DNS, Macros and OS bugs.


Because of these multiplying threats the Intrusion Detection Systems are gaining popularity and have become an integral part of the overall business strategy of an enterprise. The main purpose of an Intrusion Detection System is to identify any passive or active and any internal or external activity that is hostile to a network and then to alert the concerned system administrator and also block it as it happens. Thus, it detects any unauthorized access or misuse of a computer system and acts like a burglar alarm for a computer. Eventually many different Intrusion Detection Systems have been developed, however, the detection schemes generally fall into one of the two categories, anomaly detection or misuse detection. Anomaly detectors sort out the behavior that deviates from the normal system use. While on the other hand, misuse detectors look for the behavior that matches a known attack scenario. Another sub-category of Intrusion Detection Systems is Network Intrusion Detection Systems (NIDS). These systems look out for suspicious activity and monitor the packets. Network Intrusion Detection Systems can monitor many computers at a time over a network, while other intrusion detection systems may monitor only one.


Usually it is assumed that the people outside the networks try to break into them and gain access to the private and confidential information. However, the truth may be different for the big corporate houses. Here, the insiders pose a greater threat to the information and the overall security of the network. This is because they have the insider's knowledge of the workings of the company.


Hence, though the network security threats are multiplying with the size of the network, we can still secure our networks by acting judiciously and by having the necessary Intrusion Detection Systems on our networks.
 
 
About the Author
Mansi gupta recommends that you visit http://www.networksecurityjournal.com/intrusion_detection/index.html for more information on Intrusion detection.

Article Source: http://www.simplysearch4it.com/article/27398.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/27398.html" as shown above and make it hyperlinked.



  Some other articles by Mansi gupta
Traveling tips in Europe
Europe has always been a dream destination for tourists. With high skyscrapers, world's most beautiful beaches and rich cultural legacy, there is nothing more to desire form a perfect getaway destination. Majority European ...

Southern Comfort in elegant limousines
Limousines are the last word in elegant road travel. There are many services across America that run chartered services and you ...

The Importance of Multivitamins and Vitamins for Women
Whether you're trying to have a baby, already pregnant, going through menopause or worried about osteoporosis, it's worthwhile for you as a woman to consider the importance taking a multivitamin to create and maintain optimal health. ...

Ma Huang - Chinese herb
Ma Huang, the native-Chinese herb used in fat-burning supplements and also known as Ephedra, has been used as a natural ...

Hoodia - what it is, what it is used for?
Deep in the Kalahari Desert in South Africa a prickly like plant called Hoodia grows that could literally take your appetite away. Although this plant has been gathered and eaten by ...

Student loan consolidation guide 101
The constantly escalating fees as well as the competition in the field of higher education have made the life of a student burdened by debt. Most of the students are financially not capable of bearing the enormous ...

  
  Recent Articles
Microsoft Word. The power is under the hood
by Robert Duval

How To Select The Best Gaming Laptops
by Tim Childree

How To Select The Best Business Laptops
by Tim Childree

High-Tech Computer Rental for Business Promotion
by Michael Braganza

Managing a Worldwide Print Infrastructure from a Single Workstation in a Central Location
by Rick Ferguson

A Sneak Peek Into The World Of Refurbished Laptops
by Javier Fuller

Battery information
by goodbattery

Tell Me About Computers
by Khal Nuwar

Setting Up Your Own Internet Radio Station
by Jason Cole

Understanding Solar Energy
by Anna Stone

Mac FAXstf X Pro Faxing Program for Mac OS X Users
by Nivea David

How to Retrofit a Picture or an Image into Desktop Wallpaper for Your Computer
by Steve Dimeck

Can't connect to database