Thursday, February 20, 2020

Fiber Optic Security Systems Thesis Proposal Example | Topics and Well Written Essays - 2500 words

Fiber Optic Security Systems - Thesis Proposal Example They analyze the information such as calls, File systems and modifications application logs and other host information to detect and suppress attacks. Wireless IDPS: They are used to detect intrusions on the wireless system and rogue access points (unauthorized wireless access point used by hackers). Other IDPS systems PIDPS: (Packet Intrusion Detection System) used for packet sniffing to detect attacks. APIDS: It monitors a group of servers by analyzing and monitoring communication between the application protocols. Hybrid intrusion detection systems: Hybrid intrusion detection systems are more efficient and effective in detecting attacks and controlling them. They consist of a combination of several intrusion detection systems integrated into one device. The key function of IDPS systems are Detection of intrusion Recording of information on the detected events Notifying the administrator of the detected events Trigger preventive measures such as port blocking, limiting access of the suspect program as well as deleting infected files. The main parts of an IDPS system are: Sensor: generates the security event Console: monitors the event Engine: it records the events logged by the sensors in a specified database. 1.2.2 Methods of detecting intrusion Though there are many methods of detecting intrusions, the principal methods are: Signature based intrusion The IDPS detects a given pattern corresponding to a known threat. The known events are those that were detected and are known to cause harm in the past. For example, an email with an attached file (freepics.Exe) is usually a characteristic of malwares, or an operating system log with code 645 that depict that the host is disenabled or a...A malicious program or E-mail causes unwanted manipulation and alteration of information and files, deleting of vital information and emails, software corruption and the transfer of information without the authority or consent of the user or the system administrator (Crothers, 2002). The major roles of IDPS are to protect networks and computers from: Host based IDPS; Identifies intrusion on hosts and agents. They analyze the information such as calls, File systems and modifications application logs and other host information to detect and suppress attacks. Hybrid intrusion detection systems: Hybrid intrusion detection systems are more efficient and effective in detecting attacks and controlling them. They consist of a combination of several intrusion detection systems integrated into one device. The IDPS detects a given pattern corresponding to a known threat. The known events are those that were detected and are known to cause harm in the past. For example, an email with an attached file (freepics.Exe) is usually a characteristic of malwares, or an operating system log with code 645 that depict that the host is disenabled or a Telenet with user name 'root' that violates security policy.

Tuesday, February 4, 2020

E-waste Essay Example | Topics and Well Written Essays - 750 words

E-waste - Essay Example The technology that has been manufactured for the betterment of the society is now posing a threat as it is being dumped in larger quantities (Luther) This essay will revolve around the concept of E-Waste and how measures are being taken in order to minimize the threat that it poses to the world. E Waste is generally considered a part of the solid waste and is disposed off in the municipal solid waste along with the necessary precautions that need to be taken when disposing it off. This disposal creates a hazard for the society as these gadgets are made up of components that can be hazardous to the health of the individuals (Luther 1-3). The waste that is being disposed off consists of lead, mercury, selenium and other components which are known to be hazardous (Johri 3-4). As these products are being disposed off, the hazardous nature of E-Waste is taking a new leap and the state affairs are taking a keen interest in the aspect of recycling this waste. Many states have already implemented a strategy that forces the concerned authorities to recycle this waste rather than disposing it off. However this recycling has also caused an irk amongst the scholars as the products are being recycled and sent to the developing countries where the hazards of such material increases even further (Luther 1-3). E Waste forms around 0.01% to 1% of municipal solid waste in the developing countries. Televisions and computers that were being built previously consisted of an overwhelming amount of lead. If these computers and televisions are discarded at a ground, these dangerous elements can leak out in the soil and cause havoc. The computer chips and other circuitry are made up of other poisons that can contaminate the soil and this includes mercury which is known to be a cancer causing agent. It is thus very important for the concerned authorities to review the process of dumping this waste and