Short Paper

 Critically analyze current European and United States industry standards or recommendations for any Information Technology (IT) area or subarea (e.g., intrusion detection, data recovery, data retention, intrusion prevention, network infrastructure, identity validation, project management, telecommunications, etc.).  Compare and contrast the standards or recommendations identifying any similarities and differences between them.  Be sure to identify which standard is better.  Remember to support your opinion with factual information.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain a title page, five scholarly references, three to five pages of content, and a reference page. In addition, the paper will be submitted through the SafeAssign originality-checking tool.   More APA assistance can be found at the

Purdue University Online Writing Lab

1/21/2018 SafeAssign Originality Report

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 1/5

DEPT.SSC..SAFEASSIGN – SSC TUTORING – SAFEASSIGN SP2018

Draft SafeAssignment 02
Venkata Bejjam on Sun, Jan 21 2018, 9:36 AM

35% highest match
Submission ID: 35f49629-f506-4650-b3bc-f27113848130

Citations (8/8)

Running head: Data intrusion detection and prevention 1 Data intrusion detection and

prevention

6

1 DATA INTRUSION DETECTION AND PREVENTION NAME

Word Count: 893

Attachment ID: 195728044

WEEK-1 SHORT PAPER

35%

1 Another student’s paper

2 Another student’s paper

3 Another student’s paper

4 Another student’s paper

5 Another student’s paper

6 Another student’s paper

7 Another student’s paper

8 Another student’s paper

http://safeassign.blackboard.com/

https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_453127_1&paperId=195728044&&attemptId=35f49629-f506-4650-b3bc-f27113848130&course_id=_453127_1

https://help.blackboard.com/SafeAssign

1/21/2018 SafeAssign Originality Report

https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 2/5

COURSE

LECTURER

DATE

2 DATA INTRUSION DETECTION IS THE PROCEDURE OF MONITORING

THE SITUATIONS OCCURRING IN YOUR COMPUTER SYSTEM OR

NETWORK AND INSPECTING THEM FOR SIGNALS OF POSSIBLE CASES,

WHICH HAPPENS TO BE VIOLATIONS OR IMMINENT DANGERS OF

BREACH OF COMPUTER SECURITY INSURANCE POLICIES, ACCEPTABLE

USE GUIDELINES, OR STANDARD SECURITY TACTICS. Intrusion protection is

the procedure of carrying out intrusion recognition and wanting to stop diagnosed

possible incidents. 1 INTRUSION PREVENTION SYSTEM/ INTRUSION

DETECTION SYSTEM MARKET IS EXPECTED TO DEVELOP FROM $789.25

MILLION IN 2014 TO $1,022.99 MILLION BY 2019, AT A CAGR OF 5.3% FOR

THE TIME 2014 TO 2019 IN EUROPEAN COUNTRIES.

The Intrusion Protection System/ Intrusion Recognition System market is driven by the

increased demand for sophisticated security alternatives and increased shelling out for IT

security alternatives in this area. The SMBs over Europe are adopting (Harale &

Meshram, 2016, p. 76) the perfect solution is for supervised IDS/IPS security services for

the effective level of security to safeguard the critical property from cyber-attacks.

Therefore, IDS/IPS security is creating a positioning between tactical and functional

business tasks for an effective information security program in your community. 3

STRICT SECURITY ALTERNATIVES HAVE BEEN PUT IN PLACE BY THE

UNITED KINGDOM GOVERNMENT TO GUARD THEIR INDIVIDUALS

AGAINST RISING RANGE OF CYBER FRAUDS. The expansion of cyber terrorists

and hackers has forced the government organizations to enact various regulations to

safeguard valuable data.

4 THIS HAS HELPED TO INCREASE THE DEMAND FOR IDS/IPS

PRODUCTS AND SERVICES. The upsurge in cybersecurity hazards has noticeably

1/21/2018 SafeAssign Originality Report

https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 3/5

increased the demand for security alternatives.

These cybersecurity dangers include advanced, consistent risks, sophisticated malware,

and DDoS disorders. The upsurge in the adoption of cloud processing, cellular

communication, and BYOD to attain efficiency in business functions also escalates the

dangers to private data.

Intrusion diagnosis system/intrusion elimination system (IDS/IPS) devices are capable o

shield the network from such types of episodes.

At the US,

The Countrywide Institute of Requirements and Technology (NIST) developed this repor

in furtherance of its obligations under the Federal government Information Security

Management Take action (FISMA) of 2002, Public Regulation 107-347. NIST is in charge

of developing benchmarks and rules, including minimum amount requirements, for

providing enough information security for all firm procedures and resources; but such

regulations and provisions shall not connect with national security systems.

2 IDPSS ARE MOSTLY FOCUSED ON DETERMINING POSSIBLE

INCIDENTS. FOR INSTANCE, AN IDPS COULD FIND WHEN AN ATTACKER

HAS COMPROMISED EFFICIENTLY SOMETHING BY EXPLOITING THE

VULNERABILITY IN THE MACHINE. THE IDPS COULD THEN RECORD

THE EVENT TO SECURITY ADMINISTRATORS, WHO COULD QUICKLY

START INCIDENT RESPONSE ACTIONS TO REDUCE THE DAMAGE

TRIGGERED BY THE OCCURRENCE.

3 THE IDPS MAY ALSO LOG INFORMATION THAT MIGHT BE EMPLOYED

BY THE EVENT HANDLERS. 2 MANY IDPSS CAN EVEN BE CONFIGURED

TO IDENTIFY VIOLATIONS OF SECURITY GUIDELINES. FOR INSTANCE,

SOME IDPSS CAN BE SET WITH FIREWALL RULESET-LIKE

ADJUSTMENTS, PERMITTING THEM TO DETERMINE NETWORK TRAFFIC

THAT VIOLATES THE ORGANIZATION’S SECURITY OR SUITABLE USE

PLANS. Also, some

1/21/2018 SafeAssign Originality Report

https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 4/5

2 IDPSS CAN KEEP AN EYE ON FILE EXCHANGES AND IDENTIFY ONES

THAT COULD BE DUBIOUS, SUCH AS DUPLICATING A LARGE

REPOSITORY ONTO A USER’S LAPTOP. MANY IDPSS CAN ALSO IDENTIFY

RECONNAISSANCE ACTIVITY, WHICH MIGHT INDICATE AN ASSAULT IS

IMMINENT.

For instance, some assault tools and varieties of malware, (Wang, 2017, p. 150) especially

worms, perform reconnaissance activities such as sponsor and port scans to recognize

targets for following disorders. 2 AN IDPS COULD PROBABLY STOP

RECONNAISSANCE AND INFORM SECURITY ADMINISTRATORS, WHO

MAY TAKE ACTIONS IF NEEDED TO ALTER OTHER SECURITY CONTROLS

TO AVOID RELATED OCCURRENCES. BECAUSE RECONNAISSANCE

ACTIVITY IS SO REPEATED ON THE INTERNET, RECONNAISSANCE

RECOGNITION IS OFTEN PERFORMED GENERALLY ON PROTECTED

INSIDE NETWORKS.

Both intrusion reduction and intrusion recognition tools are made to screen network

activity for signals of misuse. A couple of two basic strategies that they could follow to

recognize potentially destructive traffic:

Personal detection

Systems have directories containing habits of known harmful activity, comparable to

those employed by antivirus software. They watch all network traffic for just about any

marketing communications that match those practices and, if indeed they see any fits,

result in an alert. Systems screen the network and build types of rational behaviour on th

time frame known as the “training period.” Then they watch the network for activity that

deviates from those criteria. In case the deviation is significant, the anomaly-detection

system activates an alert.

Anomaly-detection

The difference between intrusion avoidance and intrusion recognition systems will come

in their handling of notifications. Pure IDS systems merely advise the administrator that

1/21/2018 SafeAssign Originality Report

https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 5/5

suspicious activity occurred. IPS systems, on the other hands, are capable of blocking the

dubious traffic from joining the network. The two technologies have previously converged

for all intents and purposes. Most intrusion diagnosis products are capable of the run in

either IPS or IDS method depending after the user’s construction.

References

Harale, N. D., & Meshram, D. (2016). 5 DATA MINING TECHNIQUES FOR

NETWORK INTRUSION DETECTION AND PREVENTION SYSTEMS. 6

INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN COMPUTER

SCIENCE & TECHNOLOGY, 175-180. doi:10.21276/ijircst.2016.4.6.3

Wang, L. (2017). 7 BIG DATA IN INTRUSION DETECTION SYSTEMS AND

INTRUSION PREVENTION SYSTEMS. Journal of Computer Networks, 4(1), 48-55

8 DOI:10.12691/JCN-4-1-5

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER