Sunday, May 12, 2019
Security Network Intrusion detection system (IDS) Essay
Security Network Intrusion detection system (IDS) - Essay Example1) The first and frontmost thing is to have a grip upon the mental approach. I would try to stay composed and relaxed kind of than getting panicked. I would analyze the whole situation cool mind. Whenever a entanglement is formal, problems like these atomic number 18 likely to occur and companies always have a well organized solution for this. So, there is no need to get horrified.2) Under such a situation, it becomes important to isolate the moved(p) computer immediately. An affected machine on a net can cause all other machines on that network to be affected. I would unplug the cable and then dis bear on the affected computer both from the net and the network. This way, the intruder will not be able to have an access to the machine nor will he be able to attack other computers on the network by means of the affected one.3) I would block the port 3389 temporarily. TCP port 3389 is the Remote Desktop Protocol (R DP) that enables a user to connect to a computer on a network. I will find out if VPN (virtual private network) had been established to protect the RDP or port 3389 traffic. I would make arrangements for the establishment of site-to-site VPN tunnel before reconnecting the computer to the network so as to secure the RDP traffic from Address Resolution Protocol (ARP) poisoning (Savill, 2008). Further investigations allow Were there passwords and sensitive information saved on the computer like ISP access passwords? These must be changed at once. How long has the intrusion gone undetected? The chances of co-computers on the network being affected join on with the time the affected one keeps on working on the network. I would investigate if the computer had updated anti-virus and setting firewall software installed. I would make backups of all sensitive information and format the operating system. Then, I will reload the sensitive information from backup files while scanning them
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.