Idses Best Practices The Dependence Essay

HIDS are not deployed in the network but rather within the machine or system needed protection. Thus, configuration of HIDS is dependent on the device they are installed on and different devices require different configurations and rulesets. Hybrid IDSes are a combination of two or more IDS components and provides one of the highest levels of protection ion information systems assets and resources. However, this kind of deployment mean more resources need to be allocated to ensure optimum functioning of hybrid IDSes. From the various IDS components available, IDSes can also be differentiated by their detection types. These detection types can be signature-based, anomaly-based and stateful protocol inspection. The following are the differences in the detection types of IDSes (Scarfone & Mell, 2007):

A signature is a pattern that corresponds to a known threat. Signature-based detection is the process of comparing signatures against observed events to identify possible incidents.

Anomaly-based detection is the process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. An IDPS using anomaly-based detection has profiles that represent the normal behavior of such things as users, hosts, network connections, or applications.

Stateful protocol analysis is the process of comparing predetermined profiles of generally accepted definitions of benign protocol activity for each protocol state against observed events to identify deviations.

In the same manner as hybrid intrusion detection systems can be deployed, the same goes true for detection types. Depending upon the security needs and requirements that come up after the risk analysis, IDSes deployed throughout the network can be a combination of two or all of the various detection types. With the variety of threats and vulnerabilities that abound, hybrid deployments are always the best possible implementation because of the wider...

...

There are several methodologies and best practices involved in doing so. For startup deployments or those that are done from the ground up, deployments of IDSes is part of the secure network design and architecture and these systems are aligned with the other security controls and mechanisms. Existing information systems infrastructures requires comprehensive risk management to determine the threats and vulnerabilities thereto. Once these threats and vulnerabilities have been identified, determination of the impact and likelihood of each of these will be done and a risk register is completed. From the risk register, mitigation measures will be made and one of these will reveal where and how to deploy intrusion detection systems. Thus, this provides for the most diligent, effective and efficient deployment and utilization of IDSes because it is based on known and anticipated factors. But once again, it is always important to remember that IDSes cannot by themselves provide comprehensive protection of information systems assets and resources. They are part of the unified threat management system employed to provide for the most comprehensive security controls and measures that ensure the confidentiality, integrity, and availability of the information system.
Bibliography:

Information Assurance Technology Analysis Center (IATAC). (2009). Information assurance tools report -- Intrusion detection systems, 6th ed. Retrieved June 6, 2011 from http://iac.dtic.mil/iatac/download/intrusion_detection.pdf

Scarfone, K. & Mell, P. (2007, February). Special publication 800-94: Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. Retrieved June 6, 2011 from http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf

Sources Used in Documents:

Bibliography:

Information Assurance Technology Analysis Center (IATAC). (2009). Information assurance tools report -- Intrusion detection systems, 6th ed. Retrieved June 6, 2011 from http://iac.dtic.mil/iatac/download/intrusion_detection.pdf

Scarfone, K. & Mell, P. (2007, February). Special publication 800-94: Guide to intrusion detection and prevention systems (IDPS): Recommendations of the National Institute of Standards and Technology. Retrieved June 6, 2011 from http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf


Cite this Document:

"Idses Best Practices The Dependence" (2011, June 09) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/idses-best-practices-the-dependence-42403

"Idses Best Practices The Dependence" 09 June 2011. Web.25 April. 2024. <
https://www.paperdue.com/essay/idses-best-practices-the-dependence-42403>

"Idses Best Practices The Dependence", 09 June 2011, Accessed.25 April. 2024,
https://www.paperdue.com/essay/idses-best-practices-the-dependence-42403

Related Documents

8. Gradual Adjustment, Adaptation and Improvement It is not an untold secret that no leadership or management training program is a success in the start. This is the reason why companies today tend to work towards the persistent modification of the leadership programs after receiving the feedback. This is exceedingly important to base new programs on the feedback that is not only provided by the participants but also from their supervising

Best Practices Evidence-Based Best Practices: Interpersonal Psychotherapy and Depression Psychological diagnoses are often resistant to many treatments because the therapist is conducting therapy based on what they have seen works in the past. The problem with this approach is that although it may be a correct assumption and the therapist may have many years' experience to fall back on, this is actually an anecdotal means to a therapeutic end. The therapist most likely

Best Practices in Corrections Correctional best practices A well-established body of best practices supporting humane, decent, and effective approaches to rehabilitation exists in U.S. correctional facilities. This is particularly to high-risk offenders confined in correctional facilities. This study focuses on Correctional Health Care program as a practice contributing towards effective service delivery in various correctional centers. Assess offender risk: risk factors tend to be static since they never change. This focuses on criminological

Best Practices Almost every organization, from teachers to medical professionals, has what it calls a "best practices" paradigm. What these organizations really mean by "best practices" is using knowledge management to take what was learned by trial and error in the past and making sure the same mistakes are not repeated. This, of course, is logical -- who doesn't want to profit from past errors. Best practices are designed, in fact,

Best Practices - Airlines Best Practices: Airlines When choosing an airline, it is important to know what you are paying for. For this reason, it is a smart idea to browse through an airline's "best practices" section in order to see just how well that company treats its patrons. Out of the five airlines examined for this exercise, for instance, all five had "best practices" listed clearly for the public, yet only American

There has to be room for instructor and instructional adaptation as well, as diversity in practices is generally good for any organization and in educational institutions in particular, and it is through ongoing learning in all leaders -- which means instructors and administrators alike -- that the best practices can truly be found and through which the students are most effectively served (Hirsh & Killion, 2009). The change in