Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Security Framework Article Comparison, Essay Example

Pages: 1

Words: 316

Essay

A net work security framework is an organized program within the network to ensure data protection from intruders. Data security is vital for purposes of privacy and confidentially of information. The main aim of every security framework is to hedge the organization against security risks that provide grounds for data loss and interference with integrity.

In the light of the above fact, this excerpt compares the operational mode of Common Security Framework (CSF) with Layer Based Intrusion Detection System (LBIDS). CSF as a security framework is mostly applied in health care organizations. The framework provides for a clear risk management approach which is done by a risk assessment tool that is able to appraise the level of risk exposure. The tool has pertinent features that enable data cryptography in the event of intrusion. Just like the LIBIDS framework, CSF approach towards detection of intrusion is based on the application of blockage at any detected point. The level of detection in both frameworks depends on the number of network layers that can correspond to the varied features of different attack in question. The CSF intrusion detection system ensures data integrity, availability and confidentiality; the features tend to conform to the goals of the LBIDS framework (Denning, 2004).

Unlike LBIDS which operates in a tiered layer form to ensure data availability, integrity and confidentiality, CSF through its risk assessment tool employ features such as intrusion detection platform that is customized with security Protocol systems to ensure the three vital elements of data. The protocol provides for automatic inspection of data packets that are transmitted into and out of the system. The system can enable a free interplay between the application systems and packet transmission systems (Shah, 2003).

Works cited

Denning. An intrusion-detection model. IEEE Transactions on Software Engineering, vol. (13), no.  2004

Shah, J. Undercoffer,  Fuzzyclustering for intrusion detection. In The 12th IEEE International Conference on Fuzzy Systems IEEE Press, vol. (2) 2003.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Prevent terrorist strikes on American soil, Essay Example

Goal, Objectives, and Strategies The Department’s goal is to protect the homeland by thwarting terrorist threats and implementing emergency plans. These are the Department’s top [...]

Pages: 1

Words: 412

Essay

Science and Technology and Nation-Building, Essay Example

Science plays a pivotal role in technology. The combination of science and technology (S&T) results in the development of new knowledge used to improve human [...]

Pages: 3

Words: 768

Essay

Plato’s Portrayal of Socrates and the Historical Socrates, Essay Example

Socrates, the Athenian philosopher, changed how philosophers thought about the world. However, modern audiences believe that Socrates did not write any of his ideas down [...]

Pages: 5

Words: 1285

Essay

Ambiguity, Essay Example

The New Task I am Proposing My proposal is a promotion at work. I am a Business Development Associate at Universal New York, NY. My [...]

Pages: 1

Words: 278

Essay

Narratives That Shape Our World, Essay Example

The context and the values in the text Othello by William Shakespeare have shaped me in perspective through the main character Othello. I perceive life [...]

Pages: 6

Words: 1574

Essay

Cyber Security Career Path, Essay Example

Background The field of technology is quite intriguing. It’s fascinating to see how different technologies operate and what they have in common. It amazes me [...]

Pages: 7

Words: 1796

Essay

Prevent terrorist strikes on American soil, Essay Example

Goal, Objectives, and Strategies The Department’s goal is to protect the homeland by thwarting terrorist threats and implementing emergency plans. These are the Department’s top [...]

Pages: 1

Words: 412

Essay

Science and Technology and Nation-Building, Essay Example

Science plays a pivotal role in technology. The combination of science and technology (S&T) results in the development of new knowledge used to improve human [...]

Pages: 3

Words: 768

Essay

Plato’s Portrayal of Socrates and the Historical Socrates, Essay Example

Socrates, the Athenian philosopher, changed how philosophers thought about the world. However, modern audiences believe that Socrates did not write any of his ideas down [...]

Pages: 5

Words: 1285

Essay

Ambiguity, Essay Example

The New Task I am Proposing My proposal is a promotion at work. I am a Business Development Associate at Universal New York, NY. My [...]

Pages: 1

Words: 278

Essay

Narratives That Shape Our World, Essay Example

The context and the values in the text Othello by William Shakespeare have shaped me in perspective through the main character Othello. I perceive life [...]

Pages: 6

Words: 1574

Essay

Cyber Security Career Path, Essay Example

Background The field of technology is quite intriguing. It’s fascinating to see how different technologies operate and what they have in common. It amazes me [...]

Pages: 7

Words: 1796

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!