.

Tuesday, May 7, 2019

Intrusion Detection System Assignment Example | Topics and Well Written Essays - 500 words

Intrusion Detection outline - Assignment ExampleI shall isolate the affected data processor within no metre so as to protect the other computers on the network. First, I shall unplug the network cable and then physically disconnect the victim computer from the network which will block the attacker from gaining further access to the computer as well as from infecting other computers on the network. I shall change the subnet mask on the attacked carriage or try creating a VLAN, and if the network router is not capable of creating VLANs, then I could use some other router by using the wan way as the connection to the original router (Techie, 2009).After getting the dodging disconnected both from the internet and the network, I shall think about doing a proper action with the attacked port 3389. Because the intruder infected the port 3389, it would be necessary to block it and open it only for local functions with the co-computers. I shall look for any important network passwords that might have been saved on the computer. I shall have out if there was any sensitive information saved, such as any credit placard details and if yes, then the credit card company has to be notified immediately. I shall ask myself when the first time I caught something was going wrong which I had not considered important at that time. Other inquiries that will be necessary are that- whether the anti-virus software installed had been updated or contained non-updated virus definitions. I shall find out if upgrades had been installed and were operational. It will too be important to investigate whether VPN had been established to protect the network from getting intruded and to reduce the security breach. I shall make arrangements for the continuity of network operations like preparing redundant system and obtaining data back-ups (the State of California, 2009).

No comments:

Post a Comment