SlideShare a Scribd company logo
1 of 2
Download to read offline
"IDS in the Cloud" Please respond to the following:
(a) Explain whether or not you believe technologies such as IDS are still relevant and useful as
there is a push toward SaaS and cloud-based solutions.
(b) Discuss from your perspective how cloud-based services change incident response, for better
or worse, and determine what you believe to be the greatest preparedness concern with cloud-
based services.
PLEASE NO COPY AND PASTING
Solution
(a)
IDS - Intrusion Detection systems
To prevent threat over once computer security firewall and encryption techniques were invented.
Although, the intruders could still hack one's system. To prevent this, Intrusion detection
systems were introduced which provide the following advantages:
1.Continuously monitors and analyzes the activities of the user and system.
2.Uses pattern recognition for recognizing typical kinds of attacks.
3.Tracks user policy violations.
3. Recognizes abnormal activities through pattern recognition.
SaaS: Software as a Service
1.SaaS is a model for Software licensing and delivery which is hosted on internet on subscription
basis and made available for the internet users.
2. It is one of the categories of cloud computing, where in instead of simply installing and
maintaining software you keep it over the internet which is easily maintainable from complex
software management.
Intrusion detection systems are still relevant to protect one's private data although Cloud
computing exists.
(b) Security and Incident response is a major subject which many vendors try to overcome.
At high level, the process defines six stages of incident response :
Preparation,identification,containment,eradication,recovery,lessons learned.
Five challenges or risks or concerns faced with cloud computing:
1.Privacy and Security.
2.Cloud transition.
3.Data access
4.Service quality
5.Data accessibility.

More Related Content

Similar to IDS in the Cloud Please respond to the following(a) Explain w.pdf

Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfsarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxsarah david
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSMuhammad FAHAD
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attackAnalynk Wireless, LLC
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsMiller Energy, Inc.
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackCTi Controltech
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securityCTi Controltech
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copyAdel Zalok
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 

Similar to IDS in the Cloud Please respond to the following(a) Explain w.pdf (20)

Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attack
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Incident response in cloud environments
Incident response in cloud environmentsIncident response in cloud environments
Incident response in cloud environments
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copy
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 

More from mckenziecast21211

In a comparison of ectotherms and endotherms, which of the following.pdf
In a comparison of ectotherms and endotherms, which of the following.pdfIn a comparison of ectotherms and endotherms, which of the following.pdf
In a comparison of ectotherms and endotherms, which of the following.pdfmckenziecast21211
 
Implement Breadth-First Search with a QueueSolution Program .pdf
Implement Breadth-First Search with a QueueSolution Program .pdfImplement Breadth-First Search with a QueueSolution Program .pdf
Implement Breadth-First Search with a QueueSolution Program .pdfmckenziecast21211
 
Immunology what are TdT and AID, and what are their roles in B c.pdf
Immunology what are TdT and AID, and what are their roles in B c.pdfImmunology what are TdT and AID, and what are their roles in B c.pdf
Immunology what are TdT and AID, and what are their roles in B c.pdfmckenziecast21211
 
Gandalf the Grey started in the Forest of Mirkwood at a point with co.pdf
Gandalf the Grey started in the Forest of Mirkwood at a point with co.pdfGandalf the Grey started in the Forest of Mirkwood at a point with co.pdf
Gandalf the Grey started in the Forest of Mirkwood at a point with co.pdfmckenziecast21211
 
Explain exploratory factor analysis and give real life examplesS.pdf
Explain exploratory factor analysis and give real life examplesS.pdfExplain exploratory factor analysis and give real life examplesS.pdf
Explain exploratory factor analysis and give real life examplesS.pdfmckenziecast21211
 
Drag the labels to the correct category to demonstrate your understan.pdf
Drag the labels to the correct category to demonstrate your understan.pdfDrag the labels to the correct category to demonstrate your understan.pdf
Drag the labels to the correct category to demonstrate your understan.pdfmckenziecast21211
 
Do you agree that the Berg Letter, research moratorium, and Asilomar.pdf
Do you agree that the Berg Letter, research moratorium, and Asilomar.pdfDo you agree that the Berg Letter, research moratorium, and Asilomar.pdf
Do you agree that the Berg Letter, research moratorium, and Asilomar.pdfmckenziecast21211
 
Brief Concepts and Questions EXAM 2 Chapter 8 DNA RNA Protein What i.pdf
Brief Concepts and Questions EXAM 2 Chapter 8 DNA RNA Protein What i.pdfBrief Concepts and Questions EXAM 2 Chapter 8 DNA RNA Protein What i.pdf
Brief Concepts and Questions EXAM 2 Chapter 8 DNA RNA Protein What i.pdfmckenziecast21211
 
A population has two alleles for a particular gene, A and a, and is .pdf
A population has two alleles for a particular gene, A and a, and is .pdfA population has two alleles for a particular gene, A and a, and is .pdf
A population has two alleles for a particular gene, A and a, and is .pdfmckenziecast21211
 
A 12-year-old male complained of strange odors before loss of consci.pdf
A 12-year-old male complained of strange odors before loss of consci.pdfA 12-year-old male complained of strange odors before loss of consci.pdf
A 12-year-old male complained of strange odors before loss of consci.pdfmckenziecast21211
 
2.Which of the following statements about evolution is falseNonrand.pdf
2.Which of the following statements about evolution is falseNonrand.pdf2.Which of the following statements about evolution is falseNonrand.pdf
2.Which of the following statements about evolution is falseNonrand.pdfmckenziecast21211
 
can someone explain in a easy way chromosome walking I know its w.pdf
can someone explain in a easy way chromosome walking I know its w.pdfcan someone explain in a easy way chromosome walking I know its w.pdf
can someone explain in a easy way chromosome walking I know its w.pdfmckenziecast21211
 
9. When a bacteriophage inserts its DNA into a bacterial chromosome,.pdf
9. When a bacteriophage inserts its DNA into a bacterial chromosome,.pdf9. When a bacteriophage inserts its DNA into a bacterial chromosome,.pdf
9. When a bacteriophage inserts its DNA into a bacterial chromosome,.pdfmckenziecast21211
 
Write an informal negation for each of the following statements. Be .pdf
Write an informal negation for each of the following statements. Be .pdfWrite an informal negation for each of the following statements. Be .pdf
Write an informal negation for each of the following statements. Be .pdfmckenziecast21211
 
Write a C++ program which generates and displays a random walk acros.pdf
Write a C++ program which generates and displays a random walk acros.pdfWrite a C++ program which generates and displays a random walk acros.pdf
Write a C++ program which generates and displays a random walk acros.pdfmckenziecast21211
 
true or false1- The grouped frequency table should ideally have.pdf
true or false1- The grouped frequency table should ideally have.pdftrue or false1- The grouped frequency table should ideally have.pdf
true or false1- The grouped frequency table should ideally have.pdfmckenziecast21211
 
Answer the questions that follow the VHDL code given below. LIBRARY .pdf
Answer the questions that follow the VHDL code given below.  LIBRARY .pdfAnswer the questions that follow the VHDL code given below.  LIBRARY .pdf
Answer the questions that follow the VHDL code given below. LIBRARY .pdfmckenziecast21211
 
The weak D phenotype is thought to arise from several mechanisms. .pdf
The weak D phenotype is thought to arise from several mechanisms. .pdfThe weak D phenotype is thought to arise from several mechanisms. .pdf
The weak D phenotype is thought to arise from several mechanisms. .pdfmckenziecast21211
 
The coding region of a BACTERIAL gene has the following sequence A.pdf
The coding region of a BACTERIAL gene has the following sequence A.pdfThe coding region of a BACTERIAL gene has the following sequence A.pdf
The coding region of a BACTERIAL gene has the following sequence A.pdfmckenziecast21211
 
Regarding the ABO blood group system in humans, if an individual is g.pdf
Regarding the ABO blood group system in humans, if an individual is g.pdfRegarding the ABO blood group system in humans, if an individual is g.pdf
Regarding the ABO blood group system in humans, if an individual is g.pdfmckenziecast21211
 

More from mckenziecast21211 (20)

In a comparison of ectotherms and endotherms, which of the following.pdf
In a comparison of ectotherms and endotherms, which of the following.pdfIn a comparison of ectotherms and endotherms, which of the following.pdf
In a comparison of ectotherms and endotherms, which of the following.pdf
 
Implement Breadth-First Search with a QueueSolution Program .pdf
Implement Breadth-First Search with a QueueSolution Program .pdfImplement Breadth-First Search with a QueueSolution Program .pdf
Implement Breadth-First Search with a QueueSolution Program .pdf
 
Immunology what are TdT and AID, and what are their roles in B c.pdf
Immunology what are TdT and AID, and what are their roles in B c.pdfImmunology what are TdT and AID, and what are their roles in B c.pdf
Immunology what are TdT and AID, and what are their roles in B c.pdf
 
Gandalf the Grey started in the Forest of Mirkwood at a point with co.pdf
Gandalf the Grey started in the Forest of Mirkwood at a point with co.pdfGandalf the Grey started in the Forest of Mirkwood at a point with co.pdf
Gandalf the Grey started in the Forest of Mirkwood at a point with co.pdf
 
Explain exploratory factor analysis and give real life examplesS.pdf
Explain exploratory factor analysis and give real life examplesS.pdfExplain exploratory factor analysis and give real life examplesS.pdf
Explain exploratory factor analysis and give real life examplesS.pdf
 
Drag the labels to the correct category to demonstrate your understan.pdf
Drag the labels to the correct category to demonstrate your understan.pdfDrag the labels to the correct category to demonstrate your understan.pdf
Drag the labels to the correct category to demonstrate your understan.pdf
 
Do you agree that the Berg Letter, research moratorium, and Asilomar.pdf
Do you agree that the Berg Letter, research moratorium, and Asilomar.pdfDo you agree that the Berg Letter, research moratorium, and Asilomar.pdf
Do you agree that the Berg Letter, research moratorium, and Asilomar.pdf
 
Brief Concepts and Questions EXAM 2 Chapter 8 DNA RNA Protein What i.pdf
Brief Concepts and Questions EXAM 2 Chapter 8 DNA RNA Protein What i.pdfBrief Concepts and Questions EXAM 2 Chapter 8 DNA RNA Protein What i.pdf
Brief Concepts and Questions EXAM 2 Chapter 8 DNA RNA Protein What i.pdf
 
A population has two alleles for a particular gene, A and a, and is .pdf
A population has two alleles for a particular gene, A and a, and is .pdfA population has two alleles for a particular gene, A and a, and is .pdf
A population has two alleles for a particular gene, A and a, and is .pdf
 
A 12-year-old male complained of strange odors before loss of consci.pdf
A 12-year-old male complained of strange odors before loss of consci.pdfA 12-year-old male complained of strange odors before loss of consci.pdf
A 12-year-old male complained of strange odors before loss of consci.pdf
 
2.Which of the following statements about evolution is falseNonrand.pdf
2.Which of the following statements about evolution is falseNonrand.pdf2.Which of the following statements about evolution is falseNonrand.pdf
2.Which of the following statements about evolution is falseNonrand.pdf
 
can someone explain in a easy way chromosome walking I know its w.pdf
can someone explain in a easy way chromosome walking I know its w.pdfcan someone explain in a easy way chromosome walking I know its w.pdf
can someone explain in a easy way chromosome walking I know its w.pdf
 
9. When a bacteriophage inserts its DNA into a bacterial chromosome,.pdf
9. When a bacteriophage inserts its DNA into a bacterial chromosome,.pdf9. When a bacteriophage inserts its DNA into a bacterial chromosome,.pdf
9. When a bacteriophage inserts its DNA into a bacterial chromosome,.pdf
 
Write an informal negation for each of the following statements. Be .pdf
Write an informal negation for each of the following statements. Be .pdfWrite an informal negation for each of the following statements. Be .pdf
Write an informal negation for each of the following statements. Be .pdf
 
Write a C++ program which generates and displays a random walk acros.pdf
Write a C++ program which generates and displays a random walk acros.pdfWrite a C++ program which generates and displays a random walk acros.pdf
Write a C++ program which generates and displays a random walk acros.pdf
 
true or false1- The grouped frequency table should ideally have.pdf
true or false1- The grouped frequency table should ideally have.pdftrue or false1- The grouped frequency table should ideally have.pdf
true or false1- The grouped frequency table should ideally have.pdf
 
Answer the questions that follow the VHDL code given below. LIBRARY .pdf
Answer the questions that follow the VHDL code given below.  LIBRARY .pdfAnswer the questions that follow the VHDL code given below.  LIBRARY .pdf
Answer the questions that follow the VHDL code given below. LIBRARY .pdf
 
The weak D phenotype is thought to arise from several mechanisms. .pdf
The weak D phenotype is thought to arise from several mechanisms. .pdfThe weak D phenotype is thought to arise from several mechanisms. .pdf
The weak D phenotype is thought to arise from several mechanisms. .pdf
 
The coding region of a BACTERIAL gene has the following sequence A.pdf
The coding region of a BACTERIAL gene has the following sequence A.pdfThe coding region of a BACTERIAL gene has the following sequence A.pdf
The coding region of a BACTERIAL gene has the following sequence A.pdf
 
Regarding the ABO blood group system in humans, if an individual is g.pdf
Regarding the ABO blood group system in humans, if an individual is g.pdfRegarding the ABO blood group system in humans, if an individual is g.pdf
Regarding the ABO blood group system in humans, if an individual is g.pdf
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

IDS in the Cloud Please respond to the following(a) Explain w.pdf

  • 1. "IDS in the Cloud" Please respond to the following: (a) Explain whether or not you believe technologies such as IDS are still relevant and useful as there is a push toward SaaS and cloud-based solutions. (b) Discuss from your perspective how cloud-based services change incident response, for better or worse, and determine what you believe to be the greatest preparedness concern with cloud- based services. PLEASE NO COPY AND PASTING Solution (a) IDS - Intrusion Detection systems To prevent threat over once computer security firewall and encryption techniques were invented. Although, the intruders could still hack one's system. To prevent this, Intrusion detection systems were introduced which provide the following advantages: 1.Continuously monitors and analyzes the activities of the user and system. 2.Uses pattern recognition for recognizing typical kinds of attacks. 3.Tracks user policy violations. 3. Recognizes abnormal activities through pattern recognition. SaaS: Software as a Service 1.SaaS is a model for Software licensing and delivery which is hosted on internet on subscription basis and made available for the internet users. 2. It is one of the categories of cloud computing, where in instead of simply installing and maintaining software you keep it over the internet which is easily maintainable from complex software management. Intrusion detection systems are still relevant to protect one's private data although Cloud computing exists. (b) Security and Incident response is a major subject which many vendors try to overcome. At high level, the process defines six stages of incident response : Preparation,identification,containment,eradication,recovery,lessons learned. Five challenges or risks or concerns faced with cloud computing: 1.Privacy and Security. 2.Cloud transition. 3.Data access 4.Service quality