Running Head: INTRUSION DETECTION
March 13, 2020
Intruders are people without permission to access information in the computer system.
Many organizations have regulations in place to ensure that only authorized individuals have
access to the system. Still, in some cases, the intruders often manage to successfully get into the
system. In Information Technology, there are Intrusion Detection Systems that help to note when
an unauthorized individual has gained access to the system or is trying to gain access to the system
(Kene & Theng, 2015). With this software, a company can easily stop an impending attack or can
minimize the effect of an attack. In most attacks, the intruders often stay in the system for days,
weeks, or even months before being identified. The longer an intruder stays in the system, the more
data they will steal, and the more damage they will cause.
The intrusion detection system mainly monitors the system and provides a report of its
findings (Javaid, Niyaz, Sun, & Alam, 2016). The system can detect an intruder trying to enter the
system, but it cannot do anything to prevent this intruder from gaining access. The system will
only send a notification to the administrator informing them of the suspicious activities. It is then
up to the administrator to block the intruder from gaining access or to log out the intruder if they
are already inside the system. A company must have an active team to compliment the IDS. If the
IDS sends a notification and no one takes any action, the intruder will gain access to everything in
the system and will have the opportunity to do as they please. Another function of the IDS is to
detect the vulnerabilities of the system. When a company understands the areas that cause a risk
to cybersecurity, it will do all it can to mitigate these risks. Having an intrusion detection system
installed into a company’s computer system can help most companies keep intruders out of the
Cybersecurity is a major issue in today’s modern tech world. Companies, as well as people,
overly rely on technology, which makes cybersecurity a necessity. In most attacks, intruders often
get into the system and steal information without being noticed. Before the organization finds out
about the intruder being in the system, the damage has already been done. Cyber-attacks have been
on the rise in the recent past, and their severity keeps on increasing because of the lack of resources
to help in preventing these attacks from causing extensive damage.
Relevance & Significance
The topic is relevant, seeing as most affected companies by cyber-attacks often find the
intruders long after they gained entry, and by this time, the intruders have done a lot of damage.
One of the biggest recent cyber-attack in 2019 is the Capital One data breach. During this attack,
the hacker gained entry into the system and gained access to sensitive information. The intruder
managed to access the personal information of the company’s customers in the US and Canada.
The total number of affected clients in the US was 100 million, and in Canada, the affected
customers totaled to six million (Flitter & Weise, 2019). The company was not aware of the attack
until a cyber-security researcher informed them on 17th July.
After receiving the notification, the company analyzed their own and confirmed that there
was indeed an intruder in the system. Their investigation also concluded that the intruder gained
access on 22nd and 23rd march 2019 (Mathews, 2019). This information shows that the intruder
was in the system for close to four months. The length of time the intruder was in the system
explains why a lot of information was stolen. Once the company discovered the breach, they fixed
it immediately. If it had not been for the researcher, more damage would have been done since it
seems that the company lacks the resources to determine when suspicious activities are going on
in its systems. Such cases are why Intrusion Detection is a relevant subject. If Capital One had
detected the intrusion earlier on, they would have fixed it, and only a few or none of the customers
would have been affected.
This topic is significant because it helps in the promotion of cybersecurity. Some hackers
have advanced skills and can easily surpass the firewall used by a company; the Intrusion Detection
System helps with such cases (Shone, Ngoc, Phai, & Shi, 2018). The research will provide detailed
information about this system by clearly explaining how it works and how it can help in ensuring
system security. The research will also provide information on the implementation of this system
and the training needed for the company employees who will get affected by the changes incurred
because of this system. Other than providing information on this system, it will explore ways in
which intruders can get into the system despite there being strong security measures in place. Also,
it will help give insight into what a company can do once they get the notification that suspicious
activities are going on in the system. The significance of this research is to help the private sector
and the public sector know how they can prevent attacks from happening and how they can
minimize the attacker has launched the effect of the attack.
Flitter, E., & Weise, K. (2019, July 29). Capital One Data Breach Compromises Data of Over 100
Million. Retrieved from https://www.nytimes.com/2019/07/29/business/capital-one-databreach-hacked.html
Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A Deep Learning Approach for Network
Intrusion Detection System. Proceedings of the 9th EAI International Conference on Bioinspired Information and Communications Technologies (formerly BIONETICS).
Kene, S. G., & Theng, D. P. (2015). A review on intrusion detection techniques for cloud
computing and security challenges. 2015 2nd International Conference on Electronics
and Communication Systems (ICECS). doi:10.1109/ecs.2015.7124898
Mathews, K. (2019, August 2). Incident Of The Week: Historic Capital One Hack Reaches 100
Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A Deep Learning Approach to Network
Intrusion Detection. IEEE Transactions on Emerging Topics in Computational
Intelligence, 2(1), 41-50. doi:10.1109/tetci.2017.2772792
Purchase answer to see full