This website uses cookies to ensure you have the best experience. Learn more

Attack Prevention Article Evaluation Essay

673 words - 3 pages

Attack Prevention Article Evaluation

Attack Prevention Article Evaluation
Network intrusion prevention systems are a huge step in organization security but should they really be deployed by enterprises now? This “search security” article takes its time to explain why or why not it should be.
Mike Chapple the author of the article saw a huge release of an IPS on a large network. This IPS came with the hype of massive sales numbers and the promise to get rid of the threats and give the administrators have peace of mind that the system is protected and safe. After the IPS was launched, it crashed after 15 minutes. The IPS technology was not ready to be implemented on such a large network scale on an unfiltered connection.

I personally believe the IPS technology was a bit rushed at its time and was not ready for large-scale networking. I am sure it was tested on little networks here and there and they thought it was good to go but of course ...view middle of the document...

There are two complementary ways of looking at an IPS:

1. An IPS is an inline network-based IDS (NIDS) that has the capability to block traffic by discarding packets as well as simply detecting suspicious traffic. Alternatively, the IPS can monitor ports on a switch that receives all traffic and then send the appropriate commands to a router or firewall to block traffic. For host-based systems, an IPS is a host-based IDS that can
discard incoming traffic.
2. An IPS is a functional addition to a firewall that adds IDS types of algorithms
to the repertoire of the firewall.

Therefore, an IPS blocks traffic, as a firewall does, but makes use of the types of algorithms developed for IDSs. It is a matter of terminology whether an IPS is considered a separate, new type of product or simply another form of firewall.

Even though quite a lot of intrusions are meant to be malicious, some are not; like if someone accidentally types in the wrong address of a computer by accident and tries to get into a different system without approval.

The intrusion prevention system might modify the configuration of the security controls to interrupt the incident. “Like reconfiguring a network device to block access from the attacker. If the IPS detects that the host has vulnerabilities, it can cause patches to be applied to the host to protect it.” (Scarfone, Grance &Masone 2007)

I thought the article was informative and I liked the fact it was in layman terms for the nontechnical people to understand it better. And from what I understand IPS stops the threat and the IDS detects the threat. Both work together in order to keep a system secure and safe. This does make it easier on the administrators.

Reference

Chapple, Mike. (2008)."Network Intrusion Prevention Systems: Should Enterprises Deploy Now?" Information Security: Covering Today's Security Topics. Retrieved from; http://searchsecurity.techtarget.com/tip/Network-intrusion-prevention-systems-Should-enterprises-deploy-now?ShortReg=1&mboxConv=searchSecurity_RegActivate_Submit&

Scarfone, K., Grance, T., & Masone, K. (2007). Computer Security Incident Handling Guide (DRAFT). National Institute of Standards and Technology Special Publication 800-61. Retrieved from;

http://csrc.nist.gov/publications/nistpubs/800-61-rev1/SP800-61rev1.pdf

Other Papers Like Attack Prevention Article Evaluation

Violence at Workplace Essay

656 words - 3 pages the workplace violence. 2- Worksite analysis leading to hazard prevention and Safety training 3- Recordkeeping and program evaluation. Evaluate Alternatives Management commitment with the employee participation to prevent the workplace violence. Developing procedures to ensure that management and employees are involved in the creation and operation of a workplace violence prevention program can be achieved through regular meetings

Attack Prevention Paper

969 words - 4 pages Attack Prevention Paper Introduction Cyber-attacks which are exclusively performed for the only objective of information collecting vary from monitoring the activities which a user makes to copying vital documents included in a hard drive. While those which do harm generally involve monetary thievery and interruption of services. Cyber-attacks are a slowly growing situation

Assignment1

1228 words - 5 pages which may be a rising issue in developing countries as highlighted by Lakshmi Vijayakumar in her journal article Suicide prevention: the urgent need in developing countries. In her article, majority of the suicide occur in developing countries and major target countries are India and Chaina. Furthermore, when comparing the age group people who commit sucide in developed counties are between 15 to 25 year or elderly but developing countries the

Review Of Literature

858 words - 4 pages these articles. The article chosen cover the impact of prevention research on coronary heart disease. Let us look at the objective that talk about framework and allows the potential of the results and effectiveness of health promotion and prevention. Health promotion is the provision of information and/or education to individuals, families, and communities that encourage family unity. Community commitment, and traditional spirituality, that make

Community Corrections

1313 words - 6 pages . Department of Justice Office of Community Oriented Policing Services. cityofboise.org. (2012). Neighborhood Watch. Retrieved from http://police.cityofboise.org/crime-prevention/neighborhood-watch/ Gross, D.J., Ruoff, A. & Laino, T. (2012). Neighborhood watch groups reflect on practices after teen’s fatal shooting. Retrieved from http://www.gazette.net/article/20120417/NEWS/704179990/neighborhood-watch-groups-reflect-on-practices-after-teen-s-fatal&template=gazette National crime prevention council. (2012). Neighborhood Watch. Retrieved from http://www.ncpc.org/topics/home-and-neighborhood-safety/neighborhood-watch

Article Rebuttal

751 words - 4 pages Article Rebuttal BCOM/275 1/27/2014 Article Rebuttal “A well-regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed” (U.S. Const., am 2). Since the ratification of the Bill of Rights, including the Second Amendment in 1791, our right to bear arms has been under attack. This article rebuttal will focus on an USA Today article titled “Epidemic: Guns

Beta Blockers After Myocardial Infarction

3431 words - 14 pages practice guidelines. Circulation, 110, 588 - 636. CDC national heart disease and stroke prevention program: Utah basic implementation. (2010). Retrieved from http://www.cdc.gov/dhdsp/programs/nhdsp_program/ut.htm Ciliska, D, Cullum, N, & Marks, S. (2001). Evaluation of systematic reviews of treatment or prevention interventions. Evidenced Based Nursing, 4. doi: 10.1136/ebn.4.4.100 Chen, Z. M., Pan, H. C., Chen, Y. P., Peto, R., Collins

Review of Literature

1286 words - 6 pages end results. “Stroke is one of the leading causes of long-term disability and the fourth leading cause of death in the United States, killing more than 137 000 people a year.” Johnson, Marlene M.( Stroke and CT Perfusion. Article) Primary prevention is the prevention of disease in general and in this case primary prevention for stroke are mainly to avoid the risk factors and life style that lead to stroke such as cigarette smoking, alcohol

Asthma in Adolescents and Adults

1309 words - 6 pages pin point any one cause. This article states that atopy has been identified as a risk factor, as well as exposure to allergens can increase or induce an asthma attack (GINA: the Global Initiative for Asthma, Global strategy for asthma management and prevention). There are many factors that can affect any one person with this condition, such as heredity, obesity, smoke, exercise, upper respiratory tract infections, perfumes and certain

A Proposal to Research About Home Health Care Systems for Chronic Disease Management Based on Human Factors and Ergonomics (Hfe) Principles

4139 words - 17 pages ). Human factors and ergonomics in home care: current concerns and future considerations for health information technology. WORK: A Journal of Prevention, Assessment & Rehabilitation, 33(2), 201-209. doi: 10.3233/wor-2009-0867 This article discussed the current issues and future improvement of health information technology (HIT) for home health care within the field of human factors and ergonomics (HFE). It introduced the significant issues

What Really Motivates You

1272 words - 6 pages incomplete models. However, they will rather refine the model than rejecting it. MY COMMENTS ABOUT THIS ARTICLE: Being mere human, we have to accept the fact that innovation comes with risk. However, to progress, we need innovation. Evaluation of the risks involved with an innovation requires a careful improvisation of the consequences. Innovations are always likely to have consequences, and models are by their very nature incomplete representations

Related Essays

Cyber Attack Prevention Essay

737 words - 3 pages Cyber-Attack Prevention As cyber-criminals become cleverer with the cybercrimes, more and more individuals are in danger of a cyber-attack. The threats become more intense and damaging as technology grows. Often times, home users think computing and surfing the Internet is safe when at home. It is a necessity to be aware of the prevention methods whether at home or at work. To further the comprehension of cyber-attack prevention, an article is

Course Discription Essay

968 words - 4 pages . Participation Participate in class discussion. 2 Discussion Questions Respond to weekly discussion questions. 3 Learning Team Instructions Draft a 2-3 page description on the data security issues and concerns present at each Riordan plant. 8/26/13 5 Individual Attack Prevention Article Evaluation Using various Internet sources, find an article or website on attack prevention. Prepare a 2-3 page paper evaluating the article and information

Week 3 Paper

902 words - 4 pages catching these attacks which is within programs and applications that the users uses which detects as well as notifies the user that there is an attack. This could be something like an anti-virus and/or a malware program or even a firewall. The purpose within this paper is to discuss cyber attacks as well as the steps involved and how to prevent them which was discussed in the article by Tony M. Damico entitled Cyber Attack Prevention for the Home

Information Security Evaluation Essay

633 words - 3 pages Information Security Evaluation CMGT 441 June 16, 2014 Information Security Evaluation Introduction In today's age where technology is constantly developing and shifting faster than most individuals can recognize, one feature stand dependable is company resources. Of these resources, none seems more significant in the age of instant media than information. Safeguarding information can be crucial to a failure or achievement of the