SlideShare a Scribd company logo
1 of 3
There are many IDS and IPS systems that is been used on an
individual and organizational levels. Those systems are very
important to protect our personal information and the
company's information system. Watch the Module lecture, read
related course material, and use external resources to answer the
following questions: 1. Is the IDS the same as a firewall?
Explain the differences 2. Explain the terms False Positive and
False Negative providing an example for each one of them 3.
The textbook mentioned three I DPS technologies (Network-
Based, Wireless, and Host-based) but actually there is a fourth
IDPS technology that is called Network Behavior Analysis
(NBA) explain this type of technology providing the difference
between NBA and Network-Based Technology. 4. Should
organizations consider using multiple IDPS technologies? Why?
Explain in details and support your argument with external
references 5. Identify some of the methods used to gain
knowledge about a specific IDPS product
Solution
Answers
(1)
An IDS(Intrusion Detection System) is a software or hardware
device installed on the network to detact the report intrusion
attempts to the network.
A firewall monitors the system based on the rules that are set by
the user and regulates the activity between the system and the
internet.
IDS monitors the system for unwanted entry and reports the
same to the user.
A firewall will block traffic based on network information such
as IP Address,network port and network protocol.
It will make some decision based on the state of network.
IDS only monitors traffice. The IDS Contains a database of
known attack signatures.
(2)
False positive
A false positive is any normal behaviour that is identified as
anomalous.
Example
The major problem that false positives create is that they can
easily drown out legitimate IDS alerts.
False negative
A false negative are any alert that should have happened but
didnot.
Example
An overloaded IDS will drop packets potentially causing false
negatives.
(6)
IDPS different methods
1. anomaly detection
2 .signature detection
 There are many IDS and IPS systems that is been used on an individual.docx

More Related Content

More from Komlin1

Thematic Issues Globalization; Islam & the West.docx
Thematic Issues Globalization; Islam & the West.docxThematic Issues Globalization; Islam & the West.docx
Thematic Issues Globalization; Islam & the West.docx
Komlin1
 
The Value of Research in Social PolicyWhile research can be intere.docx
The Value of Research in Social PolicyWhile research can be intere.docxThe Value of Research in Social PolicyWhile research can be intere.docx
The Value of Research in Social PolicyWhile research can be intere.docx
Komlin1
 
The United States’ foreign policy until the end of the nineteenth ce.docx
The United States’ foreign policy until the end of the nineteenth ce.docxThe United States’ foreign policy until the end of the nineteenth ce.docx
The United States’ foreign policy until the end of the nineteenth ce.docx
Komlin1
 
The use of digital media within organizations has transformed .docx
The use of digital media within organizations has transformed .docxThe use of digital media within organizations has transformed .docx
The use of digital media within organizations has transformed .docx
Komlin1
 
The United States is experiencing disruptive politics, as promised b.docx
The United States is experiencing disruptive politics, as promised b.docxThe United States is experiencing disruptive politics, as promised b.docx
The United States is experiencing disruptive politics, as promised b.docx
Komlin1
 

More from Komlin1 (20)

Thematic Issues Globalization; Islam & the West.docx
Thematic Issues Globalization; Islam & the West.docxThematic Issues Globalization; Islam & the West.docx
Thematic Issues Globalization; Islam & the West.docx
 
The written portion of the research paper should be 9-11 pages in le.docx
The written portion of the research paper should be 9-11 pages in le.docxThe written portion of the research paper should be 9-11 pages in le.docx
The written portion of the research paper should be 9-11 pages in le.docx
 
The World since 1945Country Report- SAUDI ARABIA     Histo.docx
The World since 1945Country Report- SAUDI ARABIA     Histo.docxThe World since 1945Country Report- SAUDI ARABIA     Histo.docx
The World since 1945Country Report- SAUDI ARABIA     Histo.docx
 
The world runs on Big Data.  Traditionally, Data has been expressed .docx
The world runs on Big Data.  Traditionally, Data has been expressed .docxThe world runs on Big Data.  Traditionally, Data has been expressed .docx
The world runs on Big Data.  Traditionally, Data has been expressed .docx
 
the    1.The collaborative planning Methodology is the f.docx
the    1.The collaborative planning Methodology is the f.docxthe    1.The collaborative planning Methodology is the f.docx
the    1.The collaborative planning Methodology is the f.docx
 
The word stereotype originally referred to a method used by printers.docx
The word stereotype originally referred to a method used by printers.docxThe word stereotype originally referred to a method used by printers.docx
The word stereotype originally referred to a method used by printers.docx
 
The Value of Critical Thinking  Please respond to the followin.docx
The Value of Critical Thinking  Please respond to the followin.docxThe Value of Critical Thinking  Please respond to the followin.docx
The Value of Critical Thinking  Please respond to the followin.docx
 
The Value Chain Concept Please respond to the following·.docx
The Value Chain Concept Please respond to the following·.docxThe Value Chain Concept Please respond to the following·.docx
The Value Chain Concept Please respond to the following·.docx
 
The wealth and energy between 1880 and 1910 was a unique and dynamic.docx
The wealth and energy between 1880 and 1910 was a unique and dynamic.docxThe wealth and energy between 1880 and 1910 was a unique and dynamic.docx
The wealth and energy between 1880 and 1910 was a unique and dynamic.docx
 
The Value of Research in Social PolicyWhile research can be intere.docx
The Value of Research in Social PolicyWhile research can be intere.docxThe Value of Research in Social PolicyWhile research can be intere.docx
The Value of Research in Social PolicyWhile research can be intere.docx
 
The United States’ foreign policy until the end of the nineteenth ce.docx
The United States’ foreign policy until the end of the nineteenth ce.docxThe United States’ foreign policy until the end of the nineteenth ce.docx
The United States’ foreign policy until the end of the nineteenth ce.docx
 
The Value Chain Concept Please respond to the followingDescribe.docx
The Value Chain Concept Please respond to the followingDescribe.docxThe Value Chain Concept Please respond to the followingDescribe.docx
The Value Chain Concept Please respond to the followingDescribe.docx
 
The United States of America (U.S.A) holistically considered being t.docx
The United States of America (U.S.A) holistically considered being t.docxThe United States of America (U.S.A) holistically considered being t.docx
The United States of America (U.S.A) holistically considered being t.docx
 
The United States accused the Soviet Union of breaking all its war.docx
The United States accused the Soviet Union of breaking all its war.docxThe United States accused the Soviet Union of breaking all its war.docx
The United States accused the Soviet Union of breaking all its war.docx
 
The United States has been called a melting pot (meaning a blendin.docx
The United States has been called a melting pot (meaning a blendin.docxThe United States has been called a melting pot (meaning a blendin.docx
The United States has been called a melting pot (meaning a blendin.docx
 
The upsurge of customer and organizational use of technology and the.docx
The upsurge of customer and organizational use of technology and the.docxThe upsurge of customer and organizational use of technology and the.docx
The upsurge of customer and organizational use of technology and the.docx
 
The use of digital media within organizations has transformed .docx
The use of digital media within organizations has transformed .docxThe use of digital media within organizations has transformed .docx
The use of digital media within organizations has transformed .docx
 
The United States created Medicaid—a publicly funded health care p.docx
The United States created Medicaid—a publicly funded health care p.docxThe United States created Medicaid—a publicly funded health care p.docx
The United States created Medicaid—a publicly funded health care p.docx
 
The use of celebrities to sell products is nothing new. However, the.docx
The use of celebrities to sell products is nothing new. However, the.docxThe use of celebrities to sell products is nothing new. However, the.docx
The use of celebrities to sell products is nothing new. However, the.docx
 
The United States is experiencing disruptive politics, as promised b.docx
The United States is experiencing disruptive politics, as promised b.docxThe United States is experiencing disruptive politics, as promised b.docx
The United States is experiencing disruptive politics, as promised b.docx
 

There are many IDS and IPS systems that is been used on an individual.docx

  • 1. There are many IDS and IPS systems that is been used on an individual and organizational levels. Those systems are very important to protect our personal information and the company's information system. Watch the Module lecture, read related course material, and use external resources to answer the following questions: 1. Is the IDS the same as a firewall? Explain the differences 2. Explain the terms False Positive and False Negative providing an example for each one of them 3. The textbook mentioned three I DPS technologies (Network- Based, Wireless, and Host-based) but actually there is a fourth IDPS technology that is called Network Behavior Analysis (NBA) explain this type of technology providing the difference between NBA and Network-Based Technology. 4. Should organizations consider using multiple IDPS technologies? Why? Explain in details and support your argument with external references 5. Identify some of the methods used to gain knowledge about a specific IDPS product Solution Answers (1) An IDS(Intrusion Detection System) is a software or hardware device installed on the network to detact the report intrusion attempts to the network. A firewall monitors the system based on the rules that are set by the user and regulates the activity between the system and the
  • 2. internet. IDS monitors the system for unwanted entry and reports the same to the user. A firewall will block traffic based on network information such as IP Address,network port and network protocol. It will make some decision based on the state of network. IDS only monitors traffice. The IDS Contains a database of known attack signatures. (2) False positive A false positive is any normal behaviour that is identified as anomalous. Example The major problem that false positives create is that they can easily drown out legitimate IDS alerts. False negative A false negative are any alert that should have happened but didnot. Example An overloaded IDS will drop packets potentially causing false negatives. (6) IDPS different methods 1. anomaly detection 2 .signature detection