Wednesday, October 30, 2019
Firewalls and Intrusion Detection Systems Assignment
Firewalls and Intrusion Detection Systems - Assignment Example What are the similarities and differences of these two systems? Intrusion detection systems are software applications or devices that detects and monitors malicious activities of violations of policies provided. In addition, the application provides reports and information to management stations. The application has different ways and mechanisms that may detect network traffic from different sources. In general, intrusion detection systems focus on detecting network incidences, logging information of users and reporting log in attempts (Ross, 2001). Moreover, companies use the systems to monitor their existing security systems. This is done by detecting issues with security policies and creating documentation on existing network issues. In addition, the system may provide recommendations on how to update existing security policies. The main objectives of IDS are analyzing and monitoring system activities and users, taking part in system audits, analyzing the safety of content used and required, detecting unusual activities and comparing partners to malware patterns. One major weakness of the system is that it must contain human operations which may hinder the effectiveness of automated functionality (Verma, 2008). On the other hand, firewalls are also used to increase the effectiveness of network security approaches. Firewall protects network security systems from access from unauthorized sources. Verma (2008) is of the assumption that firewall protect security prior to their access. The author further points out that the security system relies on its ability to protect access and distortion before threat is launched. To increase the effectiveness of the system, they are regularly updated to be able to identify advanced network threats. Firewall security systems also ensure the safety of the network connection used in a business. With a protected security firewall detects both incoming and outgoing packets.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.