Intrusion detection Lewis Knight.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Introducing Computer and Network Security
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
What is FORENSICS? Why do we need Network Forensics?
BUSINESS B1 Information Security.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Revision Q1: Explain the term HACKING?
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Wireless security. Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING.
By: Surapheal Belay ITEC 6322 / Spring ABSTRACT NIST , guide to intrusion detection and prevention systems (IDPS), discusses four types of.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Intrusion Detection Systems Dj Gerena. What is an Intrusion Detection System Hardware and/or software Attempts to detect Intrusions Heuristics /Statistics.
Network System Security - Task 2. Russell Johnston.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Technical Implementation: Security Risks
8 – Protecting Data and Security
Network and hardware revision
HAVE YOU EVER SHOPLIFTED?
BUSINESS DRIVEN TECHNOLOGY
Survival Guide to Help avoid being Conned!
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
Systems Security Keywords Protecting Systems
I SEE YOU! Andrew Fritsch.
Google search not working on pc. Google Google is basically an American company Google is specialises in internet services Google have internet services.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Principles of Business Objective 2.04
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Introduction to Computers
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
How to Get Rid of Online Threats Impacting your Computer Device?
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
5 ways to keep your work safe and secure
Chapter 6 Networks Communicating and Sharing Resources
Intrusion Detection & Prevention
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
Intrusion detection systems?
INFORMATION SYSTEMS SECURITY and CONTROL
Part 3.
Disaster recovery.
Understand Risks to IT Security
Partition Starter Find out what disk partitioning is, state key features, find a diagram and give an example.
Faculty of Science IT Department By Raz Dara MA.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Unit 4 IT Security Kerris Davies.
Ethical Hacking.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Detection Detect the breach and protect the data. By,
Honeypots Visit for more Learning Resources 1.
Marcial Quinones-Cardona
G061 - Network Security.
Challenges Of Network Security
Cybersecurity Simplified: Ransomware
Computer System Security
Presentation transcript:

Intrusion detection Lewis Knight

What is it? An intrusion detection system is used to detect any intrusion attempts on a computer system or network. This device/software will monitor a network or system activities for any malicious activities or policy violations. If any malicious actions are detected then it’s the intrusion detection’s job to inform the systems defence system to act upon it

Where is it used? Intrusion detection systems can be used on system networks and computers, to add security if any malicious actions are taking place. Intrusion detections can also come in the form of a actual physical device. These devices can range from security cameras all the way to laser trip wires.

Why? If intrusion detection systems were not being used then malicious attacks could occur and the business/company would not be aware of what is going on and they could be losing money and or customers if people found out that there systems were not secure.

Benefits? The benefits to having this detection system is that you can catch and prevent attacks from malicious hackers with the intent to damage or steal information stored on a company’s network. If these attacks are caught and stopped then money and information would not be stolen saving the business money time and effort.

Disadvantages? The disadvantage to this system is it can cost a lot of money that smaller businesses may not be able to afford. This includes both the software side and hardware side. If you have a passive detection system then it is the IT managers job to check regularly to see if any attacks have been made, where as an active system will inform the defence program to come into action.

Example? Intrusion detection systems these days tend to come attached to virus management programs so that they can inform each other about the attacks and act upon it with no lag and eliminate the issue.