Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Intrusion Detection System, Essay Example

Pages: 1

Words: 308

Essay

Wireless Intrusion Detection System

As this is an information age, manual procedures and information is digitized. This is the reason why computer security is becoming a challenging task. Previously, firewall was considered as the core component for eliminating network related threats. Today, things have changed, now advanced security appliances and technologies are required such as IDS. Intrusion detection system has also evolved in to a separate term known as Wireless intrusion detection system. However, the mechanism is the same as per traditional IDS except sensing capability of detecting threats coming from a wireless network. WIDS can be defined as the process of examining the events that may have an abnormal behavior in a network or a computer system that can be identified as intrusions (Douligeris,). The components of a typical WIDS consist of agent, Sensor, Server, Console & Management, Reporting tools.  WIDS typical secure wireless network infrastructure by live sensing of data traffic coming from several data streams. Alert mechanism is efficient and reports any weakness robustly, that may allow the network engineers to react and isolate the threat. Moreover, threats from both i.e. inbound and outbound network are identified and traced. On the other hand, there are certain weaknesses that are associated with WIDS. For instance (Marina L. Gavrilova et al., ) Wired equivalent privacy (WEP) is fragile resulting in an inclusion of a threat between an ongoing data transmission. Moreover, hackers may also initiate a Denial of Service (DoS) attack by flooding the WAP via association requests that may result in a reboot.

References

Douligeris, C.Network security: Current status and future directions Hoboken, N.J. : Wiley ; 2007.

Marina L. Gavrilova, Osvaldo Gervasi, Kumar, V., David Taniar, Youngsong Mun, & Hyunseung Choo.Computational science and its applications – ICCSA 2006: International conference, glasgow, UK, may 8-11, 2006, proceedings, part V (lecture notes in computer … computer science and general issues) Springer.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Samples, Power Analysis, and Design Sensitivity Samples, Power Analysis, and Design Sensitivity, Essay Example

Compare and contrast internal and external validity. Describe and give examples of research questions for which external validity is a primary concern. Describe and give [...]

Pages: 5

Words: 1457

Essay

Business Responses, Essay Example

Idealized Attributes From the average above, I found out that the leader sometimes posses idealized attribute’s form of transformational leadership. This means that followers do [...]

Pages: 2

Words: 460

Essay

Types of Power, Essay Example

The videos taught me that there is not only one type of power but five types of powers which are referent power, reward power, legitimate [...]

Pages: 2

Words: 602

Essay

Criminal Justice: Juveniles, Essay Example

Juveniles are treated differently as compared to adult criminals. This is because most juveniles engage in petty cases and are not fully matured as to [...]

Pages: 3

Words: 769

Essay

Harris/Jardines Questions, Essay Example

Part One The issue of law considered by Kagan in this case is whether or not a drug detection dog’s alert during a traffic stop [...]

Pages: 3

Words: 772

Essay

Management Week 1 Assignment 3, Essay Example

We would like to own a Bed and Breakfast in the hill country outside of Austin, overlooking the beautiful Lake Austin.  It would be a [...]

Pages: 2

Words: 485

Essay

Samples, Power Analysis, and Design Sensitivity Samples, Power Analysis, and Design Sensitivity, Essay Example

Compare and contrast internal and external validity. Describe and give examples of research questions for which external validity is a primary concern. Describe and give [...]

Pages: 5

Words: 1457

Essay

Business Responses, Essay Example

Idealized Attributes From the average above, I found out that the leader sometimes posses idealized attribute’s form of transformational leadership. This means that followers do [...]

Pages: 2

Words: 460

Essay

Types of Power, Essay Example

The videos taught me that there is not only one type of power but five types of powers which are referent power, reward power, legitimate [...]

Pages: 2

Words: 602

Essay

Criminal Justice: Juveniles, Essay Example

Juveniles are treated differently as compared to adult criminals. This is because most juveniles engage in petty cases and are not fully matured as to [...]

Pages: 3

Words: 769

Essay

Harris/Jardines Questions, Essay Example

Part One The issue of law considered by Kagan in this case is whether or not a drug detection dog’s alert during a traffic stop [...]

Pages: 3

Words: 772

Essay

Management Week 1 Assignment 3, Essay Example

We would like to own a Bed and Breakfast in the hill country outside of Austin, overlooking the beautiful Lake Austin.  It would be a [...]

Pages: 2

Words: 485

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!