close
test_template

Intrusion Detection Systems

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 594 |

Page: 1|

3 min read

Published: Jul 10, 2019

Words: 594|Page: 1|3 min read

Published: Jul 10, 2019

Software used on the servers can play a role in their security. Unverified and inauthentic software can be beset with loopholes that can be exploited to access the system. All software should only be gotten from official software repositories which can be verified by PGP signatures. (Peltier, 2016).

The development team should strictly use a different web server to test the phone. This is considered industry best practice that should prevent instances of attacks caused by untested code. As such, no tests or debugging should be done on a production server. The use of application scanners will ensure that all internally developed code has been validated and that it doesn’t slip into production environments. The servers and their operating systems should stay patched at all times. This will prevent attackers from using a newly discovered bug to access the system. This will require staying abreast of developments as manufacturers will usually release patches shortly after a bug has been discovered. (Peltier, 2016).

Intrusion detection systems can ensure that attacks are discovered early enough. The fast alert can help in minimizing the damage done to a system by identifying threats early enough and neutralizing them accordingly. An intrusion detection system will be configured to monitor logs, processes and any sensitive directories. They will then alert the administrator of any unusual activities going on. Services should be only from accounts with the least privileges needed for the service. This will ensure that any attacker cannot use the privileges of said account to gain further access to the server. (Peltier, 2016).

Redundancy of the servers will happen with the Cincinnati data center acting as a failover to the Atlanta data center. With backups, restorations will only happen up to the restoration point and this can mean loss of data. To prevent this, a service like the Windows Distributed File System (DFS) can be used to replicate data into replica servers. This will be from the Atlanta to the Cincinnati data center. Local replication of data within the data center is not advisable and as such the Cincinnati office will be the secondary data center. (Peltier, 2016).

Wireless Technologies. While each of the offices will have its own LAN network, the two offices in Cincinnati and Atlanta will be connected by a VPN (virtual private network). While companies previously used WAN to connect to different offices, VPN provide a better solution that can use the internet to make the site to site connection. They are also secure enough to be used by employees when they are away from the offices. With the requirements that information be move at 50 mbps at all times, the VPN will prove to be a better solution than a WAN. The VPN solution is also cheaper as it can use a single line for each office and this will mean lower broadband costs. Wi-Fi technology can also be used for the LAN in the individual offices. (Cassidy, 2016).

Get a custom paper now from our expert writers.

Solutions for High Availability

It is important that access to the systems not be disrupted. This will require the appropriate measures for high availability be implemented. With database servers at both data centers, database mirroring will be sued to ensure high availability. This solution uses software to maintain a standby database or a corresponding production database that will be the principal database. This standby database will be created by restoring backup of the principal database without recovery. Another solution for high availability is through replication. This involves a primary server that will be distributing data to other servers leading to real time availability and scalability. (Cassidy, 2016).

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

Intrusion Detection Systems. (2019, Jun 27). GradesFixer. Retrieved December 20, 2024, from https://gradesfixer.com/free-essay-examples/intrusion-detection-systems/
“Intrusion Detection Systems.” GradesFixer, 27 Jun. 2019, gradesfixer.com/free-essay-examples/intrusion-detection-systems/
Intrusion Detection Systems. [online]. Available at: <https://gradesfixer.com/free-essay-examples/intrusion-detection-systems/> [Accessed 20 Dec. 2024].
Intrusion Detection Systems [Internet]. GradesFixer. 2019 Jun 27 [cited 2024 Dec 20]. Available from: https://gradesfixer.com/free-essay-examples/intrusion-detection-systems/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now