M3A1 Unit 3

575 Words2 Pages

M3A1 Initially, administrators conducted system intrusion detection by personally sitting in front of a console and monitoring all user activity. They would observe behaviors, for instance, a user being on vacation but someone logging into their account or seldom used peripheral devices all of a sudden becoming active. This form of intrusion detection may have worked at the time but it provided no scalability. The next step in intrusion detection technology was audit logs. These logs were printed daily on large fan folded paper and reviewed by system administrators. The logs would then be reviewed for suspicious activity. As time went on, the stacks became excessively large and manually reviewing the logs became too arduous. So observing an intrusion in progress was practically impossible. As technology advanced, the logs would be available online and programs were created to analyze and interpret the data. However, these programs were slow and intensive at computing the data that they had to be run during off hours. As a result, intrusions were …show more content…

These warnings can help users alter their installation’s defensive posture to increase resistance to future attacks. An intrusion detection system is comparable to a burglar alarm system. The car locks to protect the vehicle from theft. In the event someone compromises the lock, the burglar alarm detects this compromise and alarms the owner. The goal seems simple but the task proves to be difficult because intrusion technology doesn’t really detect intrusions, it just identifies evidence that an intrusion occurred at real-time or after the fact. Currently, there are two main intrusion detection technologies being used by organizations. These are network-based and host-based intrusion detection

More about M3A1 Unit 3

Open Document