HIDS or AntiVirus Systems Research Paper

Anonymous
timer Asked: Mar 30th, 2017
account_balance_wallet $10

Question Description

The focus of the reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems. Computer Virus creates major headaches for most organizations, as this list of 10 worst PC virus outbreaks shows. These viruses combined have caused damages into the billions of US Dollars. How can one protect against virus outbreaks in an organization? What are the common causes of this problems? How would use address this troublesome trend? Use your textbook, internet, and other publications to research this topic.

Paper Requirements:

APA Format

Number of Pages: Minimum of 3 Pages not including Cover, Table of Contents and References.

Tags: a d

Tutor Answer

lisa06
School: Carnegie Mellon University

Attached.

Running head: HOST INTRUSION DETECTION SYSTEMS

Host Intrusion Detection Systems
Name
Institution
Instructor
Date

1

HOST INTRUSION DETECTION SYSTEMS

2

Host Intrusion Detection Systems
Q1. Protection against virus outbreak in an organization
Intrusion detection systems (HIDS) and the network intrusion detection system is a known
outstanding intrusion detection system whose basic role is to analyzing and monitoring any
internals of any system that engages in computing, it also checks the network interfaces by
analyzing the network packages. Anti-threats applications that are involved in prevention of
various computer virus attacks like the, spyware, fire walls and antivirus software are all in
HIDS whose major target when it was being designed was the mainframe computer. The
dynamic behavior or even the state of a computer systems monitored by a host-based IDS, it not
only inspects the network packages dynamically but also even the state of a computer system. A
virus can be termed as a malicious program which interferes with the proper functioning of other
programs within the computer network system. It is not surprising that such malicious programs
are common in the information technology industry. A HIDS has the capacity of detecting which
program accesses a particular resource in the company, it may also assist in looking at the state
of any system and its information storage mode like RAM, or even log files. Sobig, Mydoom,
and Sober are some major viruses attacking networks and result numerous problems in some of
prominent companies internationally. Infection of any system by viruses, will paralyze computer
operations and their organization hence the productivity of that company will drop due to
slowdown time. The following are some clear examples of viruses that have wreaked havoc to
the computer networks in companies therefore resulting in a collapse of prominent companies:

HOST INTRUSION DETECTION SYSTEMS

3

(STORM, KLEZ, NIMDA, MELISSA, CODED RED, LOVE BAG, NETSKY AND SASSER,
MY DOOM, CONFICKER VIRUS, SQL SLAMMER).
Being more sophisticated is one feature that has contributed greatly in the technicality of
viruses and the ways of spreading. Some of the most widely known ways in which this viruses
spread is via the sending of emails. Some email attachments are just hidden viruses hence upon
opening them, they result in spread of a viruses. The sharing of the peripherals and other devices
such as infected boot disks where upon restarting your computer, it will try booting from the
infected disk rather than your drives. This will result in the activation of a virus if present. Other
common modes that viruses spread are, the internet, exchanging of CDs and the internet
downloads. The transfer of files by users and file sharing management is also another common
way of infecting a company’s system.
Application of the firewall is key as it will help in protecting all computer networks in
an organization and also block all unwanted Information from entering the system. Ensure that
the anti-virus software application is up to date, and that a genuine antivirus system is the one
used to protect the CPU. Protection of the network system by the Anti-stealth -Virus software,
the computers must ensure the virus is protected for replication. Filter various email traffic where
the outgoing and the incoming calls must be filtered for computer viruses. Users must be
educated and be advised to be careful on suspicious e-mails and that the employees must check
the system security details to note any malicious activity. Scanning all downloads made via the
internet should be performed to rule out any infection in the system and scanning should be done
regularly so as to reduce attacks by viruses.
Q2. Common causes of virus outbreak in and organization

HOST INTRUSION DETECTION SYSTEMS

4

Various and numerous causes of the virus outbreak have been identified to greatly
contribute to system failure in many organizations globally. This acts as a global threat to the
organization...

flag Report DMCA
Review

Anonymous
Top quality work from this guy! I'll be back!

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors