IDS Solution Identify the intrusion detection system (IDS) solution most appropr
ID: 3837939 • Letter: I
Question
IDS Solution
Identify the intrusion detection system (IDS) solution most appropriate for your project organization. Create a proposal for implementation of this control in which you do the following:
Explain how the selected IDS can be used to mitigate risk for your project organization.
Identify the resources required for implementation.
Describe how the selected IDS will be configured for maximum effectiveness.
Describe how the IDS implementation can be used to address specific policy and legal obligations that impact your project organization.
Explanation / Answer
The wide variety of intrusion detection system is available
from network based IDS to host based IDS.
It is important to note that an IDS is no way all inclusive security.
Choosing an IDS can be complex and time consuming project.
IDS is true if the organization does not have a corporate security program.
Intrusion Detection Systems perform a wide
vaiety of functions, includes:
– Monitoring and analyzing both user and system activities,
– Analyzes system configurations and vulnerabilities,
– Assessing system and file integrity,
– Ability to recognize patterns of attacks,
– Analysis of abnormal activity patterns.
The IDS can be eyes and ears in to system.
Network Intrusion Detection System :
NIDS is less expensive then their host based counterparts.
In ids threats and computing environment are ever changing.
Detecting malicious activity is important
overall security architecture.
the mission of deploying security controls is defeated when the
controls themselves are excessively prone to failure.