1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 1/5
DEPT.SSC..SAFEASSIGN - SSC TUTORING - SAFEASSIGN SP2018
Draft SafeAssignment 02
Venkata Bejjam on Sun, Jan 21 2018, 9:36 AM
35% highest match
Submission ID: 35f49629-f506-4650-b3bc-f27113848130
Citations (8/8)
Running head: Data intrusion detection and prevention 1 Data intrusion detection and
prevention
6
1 DATA INTRUSION DETECTION AND PREVENTION NAME
Word Count: 893
Attachment ID: 195728044
WEEK-1 SHORT PAPER.doc
35%
1 Another student's paper
2 Another student's paper
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 Another student's paper
8 Another student's paper
http://safeassign.blackboard.com/
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReportPrint?course_id=_453127_1&paperId=195728044&&attemptId=35f49629-f506-4650-b3bc-f27113848130&course_id=_453127_1
https://help.blackboard.com/SafeAssign
1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-bb_bb60/originalityReport?attemptId=35f49629-f506-4650-b3bc-f27113848130&includeDeleted=true&c… 2/5
COURSE
LECTURER
DATE
2 DATA INTRUSION DETECTION IS THE PROCEDURE OF MONITORING
THE SITUATIONS OCCURRING IN YOUR COMPUTER SYSTEM OR
NETWORK AND INSPECTING THEM FOR SIGNALS OF POSSIBLE CASES,
WHICH HAPPENS TO BE VIOLATIONS OR IMMINENT DANGERS OF
BREACH OF COMPUTER SECURITY INSURANCE POLICIES, ACCEPTABLE
USE GUIDELINES, OR STANDARD SECURITY TACTICS. Intrusion protection is
the procedure of carrying out intrusion recognition and wanting to stop diagnosed
possible incidents. 1 INTRUSION PREVENTION SYSTEM/ INTRUSION
DETECTION SYSTEM MARKET IS EXPECTED TO DEVELOP FROM $789.25
MILLION IN 2014 TO $1,022.99 MILLION BY 2019, AT A CAGR OF 5.3% FOR
THE TIME 2014 TO 2019 IN EUROPEAN COUNTRIES.
The Intrusion Protection System/ Intrusion Recognition System market is driven by the
increased demand for sophisticated security alternatives and increased shelling out for IT
security alternatives in this area. The SMBs over Europe are adopting (Harale &
Meshram, 2016, p. 76) the perfect solution is for supervised IDS/IPS security services for
the effective level of security to safeguard the critical property from cyber-attacks.
Therefore, IDS/IPS security is creating a positioning between tactical and functional
business tasks for an effective information security program in your community. 3
STRICT SECURITY ALTERNATIVES HAVE BEEN PUT IN PLACE BY THE
UNITED KINGDOM GOVERNMENT TO GUARD THEIR INDIVIDUALS
AGAINST RISING RANGE OF CYBER FRAUDS. The expansion of cyber terrorists
and hackers has forced the government organizations to enact various regulations to
safeguard valuable data.
4 THIS HAS HELPED TO INCREASE THE DEMAND FOR IDS/IPS
PRODUCTS AND SERVICES. The upsurge in cyberse ...
1. 1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReport?attemptId=35f49629-f506-4650-
b3bc-f27113848130&includeDeleted=true&c… 1/5
DEPT.SSC..SAFEASSIGN - SSC TUTORING - SAFEASSIGN
SP2018
Draft SafeAssignment 02
Venkata Bejjam on Sun, Jan 21 2018, 9:36 AM
35% highest match
Submission ID: 35f49629-f506-4650-b3bc-f27113848130
Citations (8/8)
Running head: Data intrusion detection and prevention 1 Data
intrusion detection and
prevention
6
1 DATA INTRUSION DETECTION AND PREVENTION
NAME
Word Count: 893
Attachment ID: 195728044
2. WEEK-1 SHORT PAPER.doc
35%
1 Another student's paper
2 Another student's paper
3 Another student's paper
4 Another student's paper
5 Another student's paper
6 Another student's paper
7 Another student's paper
8 Another student's paper
http://safeassign.blackboard.com/
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReportPrint?course_id=_453127_1&paperId
=195728044&&attemptId=35f49629-f506-4650-b3bc-
f27113848130&course_id=_453127_1
https://help.blackboard.com/SafeAssign
1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReport?attemptId=35f49629-f506-4650-
b3bc-f27113848130&includeDeleted=true&c… 2/5
COURSE
3. LECTURER
DATE
2 DATA INTRUSION DETECTION IS THE PROCEDURE OF
MONITORING
THE SITUATIONS OCCURRING IN YOUR COMPUTER
SYSTEM OR
NETWORK AND INSPECTING THEM FOR SIGNALS OF
POSSIBLE CASES,
WHICH HAPPENS TO BE VIOLATIONS OR IMMINENT
DANGERS OF
BREACH OF COMPUTER SECURITY INSURANCE
POLICIES, ACCEPTABLE
USE GUIDELINES, OR STANDARD SECURITY TACTICS.
Intrusion protection is
the procedure of carrying out intrusion recognition and wanting
to stop diagnosed
possible incidents. 1 INTRUSION PREVENTION SYSTEM/
INTRUSION
DETECTION SYSTEM MARKET IS EXPECTED TO
DEVELOP FROM $789.25
MILLION IN 2014 TO $1,022.99 MILLION BY 2019, AT A
CAGR OF 5.3% FOR
THE TIME 2014 TO 2019 IN EUROPEAN COUNTRIES.
4. The Intrusion Protection System/ Intrusion Recognition System
market is driven by the
increased demand for sophisticated security alternatives and
increased shelling out for IT
security alternatives in this area. The SMBs over Europe are
adopting (Harale &
Meshram, 2016, p. 76) the perfect solution is for supervised
IDS/IPS security services for
the effective level of security to safeguard the critical property
from cyber-attacks.
Therefore, IDS/IPS security is creating a positioning between
tactical and functional
business tasks for an effective information security program in
your community. 3
STRICT SECURITY ALTERNATIVES HAVE BEEN PUT IN
PLACE BY THE
UNITED KINGDOM GOVERNMENT TO GUARD THEIR
INDIVIDUALS
AGAINST RISING RANGE OF CYBER FRAUDS. The
expansion of cyber terrorists
and hackers has forced the government organizations to enact
various regulations to
safeguard valuable data.
4 THIS HAS HELPED TO INCREASE THE DEMAND FOR
5. IDS/IPS
PRODUCTS AND SERVICES. The upsurge in cybersecurity
hazards has noticeably
1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReport?attemptId=35f49629-f506-4650-
b3bc-f27113848130&includeDeleted=true&c… 3/5
increased the demand for security alternatives.
These cybersecurity dangers include advanced, consistent risks,
sophisticated malware,
and DDoS disorders. The upsurge in the adoption of cloud
processing, cellular
communication, and BYOD to attain efficiency in business
functions also escalates the
dangers to private data.
Intrusion diagnosis system/intrusion elimination system
(IDS/IPS) devices are capable o
shield the network from such types of episodes.
At the US,
The Countrywide Institute of Requirements and Technology
(NIST) developed this repor
6. in furtherance of its obligations under the Federal government
Information Security
Management Take action (FISMA) of 2002, Public Regulation
107-347. NIST is in charge
of developing benchmarks and rules, including minimum
amount requirements, for
providing enough information security for all firm procedures
and resources; but such
regulations and provisions shall not connect with national
security systems.
2 IDPSS ARE MOSTLY FOCUSED ON DETERMINING
POSSIBLE
INCIDENTS. FOR INSTANCE, AN IDPS COULD FIND WHEN
AN ATTACKER
HAS COMPROMISED EFFICIENTLY SOMETHING BY
EXPLOITING THE
VULNERABILITY IN THE MACHINE. THE IDPS COULD
THEN RECORD
THE EVENT TO SECURITY ADMINISTRATORS, WHO
COULD QUICKLY
START INCIDENT RESPONSE ACTIONS TO REDUCE THE
DAMAGE
TRIGGERED BY THE OCCURRENCE.
3 THE IDPS MAY ALSO LOG INFORMATION THAT MIGHT
7. BE EMPLOYED
BY THE EVENT HANDLERS. 2 MANY IDPSS CAN EVEN
BE CONFIGURED
TO IDENTIFY VIOLATIONS OF SECURITY GUIDELINES.
FOR INSTANCE,
SOME IDPSS CAN BE SET WITH FIREWALL RULESET-
LIKE
ADJUSTMENTS, PERMITTING THEM TO DETERMINE
NETWORK TRAFFIC
THAT VIOLATES THE ORGANIZATION'S SECURITY OR
SUITABLE USE
PLANS. Also, some
1/21/2018 SafeAssign Originality Report
https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReport?attemptId=35f49629-f506-4650-
b3bc-f27113848130&includeDeleted=true&c… 4/5
2 IDPSS CAN KEEP AN EYE ON FILE EXCHANGES AND
IDENTIFY ONES
THAT COULD BE DUBIOUS, SUCH AS DUPLICATING A
LARGE
REPOSITORY ONTO A USER'S LAPTOP. MANY IDPSS CAN
ALSO IDENTIFY
8. RECONNAISSANCE ACTIVITY, WHICH MIGHT INDICATE
AN ASSAULT IS
IMMINENT.
For instance, some assault tools and varieties of malware,
(Wang, 2017, p. 150) especially
worms, perform reconnaissance activities such as sponsor and
port scans to recognize
targets for following disorders. 2 AN IDPS COULD
PROBABLY STOP
RECONNAISSANCE AND INFORM SECURITY
ADMINISTRATORS, WHO
MAY TAKE ACTIONS IF NEEDED TO ALTER OTHER
SECURITY CONTROLS
TO AVOID RELATED OCCURRENCES. BECAUSE
RECONNAISSANCE
ACTIVITY IS SO REPEATED ON THE INTERNET,
RECONNAISSANCE
RECOGNITION IS OFTEN PERFORMED GENERALLY ON
PROTECTED
INSIDE NETWORKS.
Both intrusion reduction and intrusion recognition tools are
made to screen network
activity for signals of misuse. A couple of two basic strategies
that they could follow to
9. recognize potentially destructive traffic:
Personal detection
Systems have directories containing habits of known harmful
activity, comparable to
those employed by antivirus software. They watch all network
traffic for just about any
marketing communications that match those practices and, if
indeed they see any fits,
result in an alert. Systems screen the network and build types of
rational behaviour on th
time frame known as the "training period." Then they watch the
network for activity that
deviates from those criteria. In case the deviation is significant,
the anomaly-detection
system activates an alert.
Anomaly-detection
The difference between intrusion avoidance and intrusion
recognition systems will come
in their handling of notifications. Pure IDS systems merely
advise the administrator that
1/21/2018 SafeAssign Originality Report
10. https://wilmu.blackboard.com/webapps/mdb-sa-
bb_bb60/originalityReport?attemptId=35f49629-f506-4650-
b3bc-f27113848130&includeDeleted=true&c… 5/5
suspicious activity occurred. IPS systems, on the other hands,
are capable of blocking the
dubious traffic from joining the network. The two technologies
have previously converged
for all intents and purposes. Most intrusion diagnosis products
are capable of the run in
either IPS or IDS method depending after the user's
construction.
References
Harale, N. D., & Meshram, D. (2016). 5 DATA MINING
TECHNIQUES FOR
NETWORK INTRUSION DETECTION AND PREVENTION
SYSTEMS. 6
INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH
IN COMPUTER
SCIENCE & TECHNOLOGY, 175-180.
doi:10.21276/ijircst.2016.4.6.3
Wang, L. (2017). 7 BIG DATA IN INTRUSION DETECTION
SYSTEMS AND
INTRUSION PREVENTION SYSTEMS. Journal of Computer
Networks, 4(1), 48-55