Tuesday, 18 February 2020

Physical Security

0 comments

Physical Security


? Physical security is an essential part of a security plan. It forms the basis for all other
security efforts, including data security.
? Physical threat to a computer system could be as a result of loss of the whole computer
system, damage of hardware, damage to the computer software, theft of the computer
system, vandalism, natural disaster such as flood, fire, war, earthquakes, etc.
? Certain natural disasters could either severely damage the computer system directly, or
prevent its operations.
? To restrict physical access, a security system must be able to differentiate among authorized
and unauthorized individuals.
? Intrusion Detection System (IDS) technology is an important component in designing a
secure environment. It is a type of security management system for computers and
networks.
? An IDS gathers and analyzes information from various areas within a computer or a
network to identify possible security breaches, which include both intrusions and misuse.
Notes ? In a Network-based Intrusion-detection System (NIDS), the sensors are located at choke
points in network to be monitored, often in the Demilitarized Zone (DMZ) or at network
borders.
? A Protocol-based Intrusion Detection System (PIDS) consists of a system or agent that
would typically sit at the front end of a server, monitoring and analyzing the
communication protocol between a connected device.
5.10 Keywords
Application Protocol-based Intrusion Detection System: it consists of a system or agent that
would typically sit within a group of servers, monitoring and analyzing the communication on
application specific protocols.
Computer Terrorism: It is the act of destroying or of corrupting computer systems with an aim
of destabilizing a country or of applying pressure on a government.
Disaster: It is defined as a sudden misfortune that is ruinous to an undertaking.
Host-based Intrusion Detection System: It consists of an agent on a host which identifies intrusions
by analyzing system calls, application logs, file-system modifications (binaries, password files,
capability/acl databases) and other host activities and state.
Hybrid Intrusion Detection System: It combines two or more approaches, like host agent data is
combined with network information to form a comprehensive view of the network.
Intrusion Detection System: It gathers and analyzes information from various areas within a
computer or a network to identify possible security breaches, which include both intrusions and
misuse.
Intrusion Prevention System: It is a network security device that monitors network and/or
system activities for malicious or unwanted behavior and can react, in real-time, to block or
prevent those activities.
Network Intrusion Detection System: It is an independent platform which identifies intrusions
by examining network traffic and monitors multiple hosts.
Protocol-based Intrusion Detection System: It consists of a system or agent that would typically
sit at the front end of a server, monitoring and analyzing the communication protocol between
a connected device (a user/PC or system).


1. What is physical security? Discuss the elements that should be considered for physical
security.
2. Explain the various physical threats to the information system.
3. Discuss the concept of natural disasters.
4. Explain the techniques used for controlling physical access.
5. What are the various types of intrusion-detection systems?
6. Why intrusion detection system is important?
7. Write short note on application protocol-based intrusion detection system.
8. Describe host-based intrusion detection system.
9. What do you mean by intrusion prevention systems? Why IPS is required?
10. How intrusion prevention systems can be categorized?

No comments:

Post a comment