Critically analyze current European and United States industry standards or recommendations for any Information Technology (IT) area or subarea (e.g., intrusion detection, data recovery, data retention, intrusion prevention, network infrastructure, identity validation, project management, telecommunications, etc.). Compare and contrast the standards or recommendations identifying any similarities and differences between them. Be sure to identify which standard is better. Remember to support your opinion with factual information.
The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain a title page, five scholarly references, three to five pages of content, and a reference page. In addition, the paper will be submitted through the SafeAssign originality-checking tool. More APA assistance can be found at the
Purdue University Online Writing Lab
.
1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 1/5
DEPT.SSC..SAFEASSIGN – SSC TUTORING – SAFEASSIGN SP2018
Draft SafeAssignment 02
Venkata Bejjam on Sun, Jan 21 2018, 9:36 AM
35% highest match
Submission ID: 35f49629-f506-4650-b3bc-f27113848130
Citations (8/8)
Running head: Data intrusion detection and prevention 1 Data intrusion detection and
prevention
6
1 DATA INTRUSION DETECTION AND PREVENTION NAME
Word Count: 893
Attachment ID: 195728044
WEEK-1 SHORT PAPER
35%
1 Another student’s paper
2 Another student’s paper
3 Another student’s paper
4 Another student’s paper
5 Another student’s paper
6 Another student’s paper
7 Another student’s paper
8 Another student’s paper
http://safeassign.blackboard.com/
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_453127_1&paperId=195728044&&attemptId=35f49629-f506-4650-b3bc-f27113848130&course_id=_453127_1
https://help.blackboard.com/SafeAssign
1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 2/5
COURSE
LECTURER
DATE
2 DATA INTRUSION DETECTION IS THE PROCEDURE OF MONITORING
THE SITUATIONS OCCURRING IN YOUR COMPUTER SYSTEM OR
NETWORK AND INSPECTING THEM FOR SIGNALS OF POSSIBLE CASES,
WHICH HAPPENS TO BE VIOLATIONS OR IMMINENT DANGERS OF
BREACH OF COMPUTER SECURITY INSURANCE POLICIES, ACCEPTABLE
USE GUIDELINES, OR STANDARD SECURITY TACTICS. Intrusion protection is
the procedure of carrying out intrusion recognition and wanting to stop diagnosed
possible incidents. 1 INTRUSION PREVENTION SYSTEM/ INTRUSION
DETECTION SYSTEM MARKET IS EXPECTED TO DEVELOP FROM $789.25
MILLION IN 2014 TO $1,022.99 MILLION BY 2019, AT A CAGR OF 5.3% FOR
THE TIME 2014 TO 2019 IN EUROPEAN COUNTRIES.
The Intrusion Protection System/ Intrusion Recognition System market is driven by the
increased demand for sophisticated security alternatives and increased shelling out for IT
security alternatives in this area. The SMBs over Europe are adopting (Harale &
Meshram, 2016, p. 76) the perfect solution is for supervised IDS/IPS security services for
the effective level of security to safeguard the critical property from cyber-attacks.
Therefore, IDS/IPS security is creating a positioning between tactical and functional
business tasks for an effective information security program in your community. 3
STRICT SECURITY ALTERNATIVES HAVE BEEN PUT IN PLACE BY THE
UNITED KINGDOM GOVERNMENT TO GUARD THEIR INDIVIDUALS
AGAINST RISING RANGE OF CYBER FRAUDS. The expansion of cyber terrorists
and hackers has forced the government organizations to enact various regulations to
safeguard valuable data.
4 THIS HAS HELPED TO INCREASE THE DEMAND FOR IDS/IPS
PRODUCTS AND SERVICES. The upsurge in cybersecurity hazards has noticeably
1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 3/5
increased the demand for security alternatives.
These cybersecurity dangers include advanced, consistent risks, sophisticated malware,
and DDoS disorders. The upsurge in the adoption of cloud processing, cellular
communication, and BYOD to attain efficiency in business functions also escalates the
dangers to private data.
Intrusion diagnosis system/intrusion elimination system (IDS/IPS) devices are capable o
shield the network from such types of episodes.
At the US,
The Countrywide Institute of Requirements and Technology (NIST) developed this repor
in furtherance of its obligations under the Federal government Information Security
Management Take action (FISMA) of 2002, Public Regulation 107-347. NIST is in charge
of developing benchmarks and rules, including minimum amount requirements, for
providing enough information security for all firm procedures and resources; but such
regulations and provisions shall not connect with national security systems.
2 IDPSS ARE MOSTLY FOCUSED ON DETERMINING POSSIBLE
INCIDENTS. FOR INSTANCE, AN IDPS COULD FIND WHEN AN ATTACKER
HAS COMPROMISED EFFICIENTLY SOMETHING BY EXPLOITING THE
VULNERABILITY IN THE MACHINE. THE IDPS COULD THEN RECORD
THE EVENT TO SECURITY ADMINISTRATORS, WHO COULD QUICKLY
START INCIDENT RESPONSE ACTIONS TO REDUCE THE DAMAGE
TRIGGERED BY THE OCCURRENCE.
3 THE IDPS MAY ALSO LOG INFORMATION THAT MIGHT BE EMPLOYED
BY THE EVENT HANDLERS. 2 MANY IDPSS CAN EVEN BE CONFIGURED
TO IDENTIFY VIOLATIONS OF SECURITY GUIDELINES. FOR INSTANCE,
SOME IDPSS CAN BE SET WITH FIREWALL RULESET-LIKE
ADJUSTMENTS, PERMITTING THEM TO DETERMINE NETWORK TRAFFIC
THAT VIOLATES THE ORGANIZATION’S SECURITY OR SUITABLE USE
PLANS. Also, some
1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 4/5
2 IDPSS CAN KEEP AN EYE ON FILE EXCHANGES AND IDENTIFY ONES
THAT COULD BE DUBIOUS, SUCH AS DUPLICATING A LARGE
REPOSITORY ONTO A USER’S LAPTOP. MANY IDPSS CAN ALSO IDENTIFY
RECONNAISSANCE ACTIVITY, WHICH MIGHT INDICATE AN ASSAULT IS
IMMINENT.
For instance, some assault tools and varieties of malware, (Wang, 2017, p. 150) especially
worms, perform reconnaissance activities such as sponsor and port scans to recognize
targets for following disorders. 2 AN IDPS COULD PROBABLY STOP
RECONNAISSANCE AND INFORM SECURITY ADMINISTRATORS, WHO
MAY TAKE ACTIONS IF NEEDED TO ALTER OTHER SECURITY CONTROLS
TO AVOID RELATED OCCURRENCES. BECAUSE RECONNAISSANCE
ACTIVITY IS SO REPEATED ON THE INTERNET, RECONNAISSANCE
RECOGNITION IS OFTEN PERFORMED GENERALLY ON PROTECTED
INSIDE NETWORKS.
Both intrusion reduction and intrusion recognition tools are made to screen network
activity for signals of misuse. A couple of two basic strategies that they could follow to
recognize potentially destructive traffic:
Personal detection
Systems have directories containing habits of known harmful activity, comparable to
those employed by antivirus software. They watch all network traffic for just about any
marketing communications that match those practices and, if indeed they see any fits,
result in an alert. Systems screen the network and build types of rational behaviour on th
time frame known as the “training period.” Then they watch the network for activity that
deviates from those criteria. In case the deviation is significant, the anomaly-detection
system activates an alert.
Anomaly-detection
The difference between intrusion avoidance and intrusion recognition systems will come
in their handling of notifications. Pure IDS systems merely advise the administrator that
1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 5/5
suspicious activity occurred. IPS systems, on the other hands, are capable of blocking the
dubious traffic from joining the network. The two technologies have previously converged
for all intents and purposes. Most intrusion diagnosis products are capable of the run in
either IPS or IDS method depending after the user’s construction.
References
Harale, N. D., & Meshram, D. (2016). 5 DATA MINING TECHNIQUES FOR
NETWORK INTRUSION DETECTION AND PREVENTION SYSTEMS. 6
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN COMPUTER
SCIENCE & TECHNOLOGY, 175-180. doi:10.21276/ijircst.2016.4.6.3
Wang, L. (2017). 7 BIG DATA IN INTRUSION DETECTION SYSTEMS AND
INTRUSION PREVENTION SYSTEMS. Journal of Computer Networks, 4(1), 48-55
8 DOI:10.12691/JCN-4-1-5