Free Essay

Cis 210 Case Study

In:

Submitted By xden
Words 380
Pages 2
Course: Name
Intrusion Detection System
Yours Name
Professor’s Name [optional]
DOS:
University

The fear of malicious attack has made us aware to secure our computer systems. Earlier, the information and data were stored in a central computer system but now it has been moved to the cloud like environment. These internet based technologies has made flexible data access and motivated mobile workforce but it has also increased danger of being attacked. One loop hole can harm your organization or breach your private data. Firewalls are used to secure the networks but they are not sufficient when these systems are becoming so vast. These now can be protected using intrusion detection system (IDS) which are used on two level- host level (HIDS) and network level ids (NIDS).
HIDS aim to protect single computer systems which are capable of detecting any malicious activity to be attacked on that particular computer system. These are also called sensors and are required for every machine. They increases the security as it is impossible to attack on so many NIDS installed on each system. These sensors monitor the data being passed and the events going on the system in which it is installed. HIDS are heavily dependent on audit trails and are manufacturer dependent. HIDS are capable of detecting who is using the system and can trace any improper activity with specific id. They are enough capable of working in switched topology environment and can also work on encrypted environment.
NIDS works at network level, it means they are not securing single computer but the whole network. They monitor the data traveling on any of the network segment, hence they are more capable. Each of the NIDS comes with attack signatures which are the definition of attack. These sensors alert if there are some improper activity found.
Using NIDS is more appropriate as it will not degrade the performance of the entire system. Another advantage is that monitoring process will be transparent to all hosts. Installing HIDS needs expertise while installment of NIDS doesn’t.
References
Zhengbing, H., Zhitang, L., & Junqi, W. (2008, January). A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining. In Knowledge Discovery and Data Mining, 2008. WKDD 2008. First International Workshop on (pp. 10-16). IEEE.
-------------------------------------------------

Similar Documents

Premium Essay

Cis 210 Case Study

...If you are using the Machly Destin Week 4 Assignment 2: Use Cases CIS 210 May 4, 2015 Modeling tools and techniques that can be used to understand the design of the system There are many. During this process, these tools and techniques, can help you to describe the interaction of the user's business processes, requirements, and with the system. One type of modeling is a functional exploded view (FDD). It is to describe the process, to use the top-down model is similar to the organization chart. FDD is in the lower level of the process, is a good way to destroy a higher level of process. Another type of modeling technology is the business process model. Business process model, you can either fill the product order, it is suitable...

Words: 1230 - Pages: 5

Free Essay

Cis 210 Case Study 2

...Case Study 2 CIS 210 Professor: Gerry Waldrop Strayer University Eric Bracken 2/25/2016 Our client has requested a payroll management system for the entire organization. This organization has several branch offices spread across the U.S. that are connected through a Wide Area Network. The preceding information is an explanation of the architecture for the new payroll application. In addition to a diagram illustrating the new application, the types of technology for our architecture and the ethical concerns presented by it are also included. The client currently has a large data center and several branch offices in place. The new system is designed to utilize the existing infrastructure and platform for an easier integration. Using the existing infrastructure will help reduce the initial costs of implementation and administrative overhead. Both of these factors will reflect on the final TCO. The users will simply be able to log into the web portal and interact with the system. All of the processing power used will be that inside the datacenter managed by the same individuals as all other services. A client/server model will be utilized with the clients on a thin-client design for the new payroll application. The client/server model divides the processing between the client and server. Using the thin-client design places most of the processing on the server side. In this case the user interface and data input will be the only processing done on the client side...

Words: 731 - Pages: 3

Premium Essay

Get Online Help with Ur Assignment Ashford a+Material

...http://homeworktimes.com/downloads/acc-202-complete-course-acc-202-entire-course/ http://homeworktimes.com/downloads/acc-206-entire-course-new/ http://homeworktimes.com/downloads/acc-206-new-week-1-assignment-chapter-one-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-assignment-chapter-two-three-problems/ http://homeworktimes.com/downloads/acc-206-new-week-2-journal-institute-management-accounting/ http://homeworktimes.com/downloads/acc-206-new-week-3-assignment-chapter-four-five-problems/ http://homeworktimes.com/downloads/acc-206-new-week-3-journal-hershey-company/ http://homeworktimes.com/downloads/acc-206-new-week-4-assignment-chapter-six-seven-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-chapter-eight-problems/ http://homeworktimes.com/downloads/acc-206-new-week-5-assignment-final-paper/ http://homeworktimes.com/downloads/acc-212-financial-accounting/ http://homeworktimes.com/downloads/acc-250-complete-course-acc-205-entire-course/ http://homeworktimes.com/downloads/acc-290-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-291-complete-course-acc-290-entire-course/ http://homeworktimes.com/downloads/acc-340-entire-course-acc-340-complete-course/ http://homeworktimes.com/downloads/acc-400-complete-course-acc-400-entire-course/ http://homeworktimes.com/downloads/acc-407-entire-course/ http://homeworktimes.com/downloads/acc-455-complete-course/ http://homeworktimes.com/downl...

Words: 3197 - Pages: 13

Premium Essay

Exercise During Pregnancy Literature Review

...They suggested that exercise during pregnancy decreased the appearance of high birth weight or macrosomia of babies. The result showed that women who lived actively have lower tendency to deliver macrosomia babies compared to inactive women. After adjustment for maternal age, prepregnancy BMI, education level and parity they got OR of 1.00 for inactive women, 0.74 for active women and 0.61 for very active women which contributed for a very significant p value (p=0.005) [6]. Their result were supported by Tomic, Sporis [10] and Barakat, Pelaez [3] reports. Barakat, Palaez [3] documented a 58 % reduction of macrosomia with p value less than 0.05 (p=0.002) [3] whereas Tomic, Sporis [10] listed lower density of macrosomia in their study with (p=0.048) [10]. The comparisons between the three researches concerning the occurrences of macrosomia with the effect of exercise during pregnancy can be seen in Table 1 whereby all their p values were...

Words: 1411 - Pages: 6

Free Essay

Access Control System

...Case Study 1: Access Control System Antonicia Holmes Course: CIS 210 Instructor: Bagus Adiyanto Strayer University November 5, 2015 Project Scope Statement: The scope of this project is to install an access control system in a dormitory. The ACS (Access Control System) will enable the dormitory door to unlock mechanically by the use of a proximity reader and combine with an existing security camera. The camera is programmed to spin around to point at him/her and video tape the person while he/she use their identification card to unlock the dormitory door. The Five Tasks The project can be carried out in 5 major tasks and each main task can be sub-divided into the following sub-tasks. 1.) Preparation of the Project It is the initial major task; the steps that have to be taken before the system is built. a) Creating a team to help perform with other tasks. b) Surveying the College Dormitory to study the location. c) Creating the design consisting of the dorm’s visual diagrams. d) Examine the current dormitory’s security system to integrate with ACS. e) Preparing proposals to management f) Estimating total cost. 2.) Installation It is the second task; the steps that include manually putting on the hardware required for the ACS, including its cameras and readers. a) Making the Control Panel b) Wiring c) Putting readers on the walls and doors. d) Repositioning the camera to point towards the readers on the external...

Words: 449 - Pages: 2

Premium Essay

Case-Study (Payroll Program)

...Case Study (Payroll Program) Ian Strayer Strayer University Professor Farzan Soroushi Cis 210 February21st, 2013 Abstract Building a payroll program for a large organization with offices spread across the United States has many changelings and most be done in a particular way. Thus having the right application architecture is important where the design is concerned, because the company has one large data center that each office connects to via a wide area network (WAN). Hence the appropriate architecture for this situation would have to consist of a WAN diagram to be used in management of this project, along with system documentation, and information technology architecture documents to provide a visual representation of the network. Wide area networks (WANs) cover a large, physical area. Many WANs cover entire buildings, cities, states, or regions. Thus the primary purpose of my WAN is to link together local area networks, of these other offices spread across the country Payroll Program * In this Payroll program the case study has been centered on having the proper application architecture that would be effective for the situation at hand. It would take into consideration where what equipment needs to be and where its physical location should be as to be effective for the organization. Thus an effective system would combine elements into an architecture, or design, that is flexible, cost-effective, technically sound, and able to support the information needs...

Words: 715 - Pages: 3

Premium Essay

Aau Catalog

...ALLIED AMERICAN UNIVERSITY Personalized. Flexible. Dedicated. Online Programs – Individual Support – Open Enrollment – Ease of Transfer Credits UNIVERSITY CATALOG 2013 Seventh Edition 22952 Alcalde Drive, Laguna Hills, CA 92653 Phone: (888) 384-0849 ∼ Fax: (949) 707-2978 7:00 A.M. – 5:00 P.M. (Monday – Friday) Email: info@allied.edu Website: www.allied.edu KEY STAFF AND FACULTY Charlotte Hislop, Ph.D. Candidate, President/CEO Bonny Nickle, Ed.D., Provost Eric Sharkey, M.Ed., Director of Education Bill Luton, Ph.D., Director of Assessment and Dean of Business Carlo Tannoury, Ph.D. Candidate, Dean of Computer Information Systems Patricia Drown, Ph.D., Dean of Criminal Justice and General Studies C.J. Bishop, M.B.A., Institutional Research Frank Vazquez, Operations Director Parrish Nicholls, J.D., Director of Compliance Lindsay Oglesby, Admissions Director Abby Dolan, B.A., Registrar Sasha Heard, M.B.A., Student Services Manager Barbara Jobin, B.S.B.A., Career Center Manager Hugo Aguilar, B.A., Chief Financial Officer Richard Madrigal, B.A., Financial Aid Officer As a prospective student at Allied American University, you are encouraged to review this catalog prior to signing an enrollment agreement. You are also encouraged to review the student performance fact sheet which must be provided to you prior to signing an enrollment agreement. This catalog is not a contract between the student, AAU, or any party or parties. Reasonable effort was made at the time this document...

Words: 52297 - Pages: 210

Free Essay

Cis210Week4Assignment2Usecases

...Use Cases CIS 210: Systems Analysis and Development November 3, 2013 A use case with typical and alternate courses that documents the event of a bank customer withdrawing money from an ATM. In this particular use-case scenario a system analysis will be identified when a bank customer interacts with an ATM to withdraw money. Typical and alternate courses will be identified. A use-case diagram will be used as a tool to provide clarification of the necessary components or processes including hardware, system software, process and human interaction to layout or plan and identify the various components necessary to produce the desired session outcome. Rouse (2007) describes the use-case methodology; “A use case is a methodology used in system analysis to identify, clarify, and organize system requirements. The use case is made up of a set of possible sequences of interactions between systems and users in a particular environment and related to a particular goal. It consists of a group of elements (for example, classes and interfaces) that can be used together in a way that will have an effect larger than the sum of the separate elements combined. The use case should contain all system activities that have significance to the users. A use case can be thought of as a collection of possible scenarios related to a particular goal, indeed, the use case and goal are sometimes considered to be synonymous.” In this project a use case methodology...

Words: 1164 - Pages: 5

Premium Essay

Case Study 1: Building an Access Control System

...Running head: CASE STUDY 1 BUILDING AN ACCESS CONTROL SYSTEM 1 Building an Access Control System Case Study 1 Holly Dillon Professor Jennifer Merritt Systems Analysis and Development CIS/210 April 28th, 2014 BUILDING AN ACCESS CONTROL SYSTEM 2 Building an Access Control System Project Scope Description As a member of the Information Security Team at a small College, I have been made the Project Manager to install an Access Control System (ACS) in a dormitory. For this small College an ACS (Access Control System) needs to be implemented to unlock the dormitory doors, to record a person as they use their identification card to unlock the door. An electronic proximity reader is needed to integrated with the existing security camera system with the camera’s being able to face and rotate at the door. The tasks to put in place are simple and easy to follow along with guidelines for each step. Rosenblatt. (2012). The five major tasks with descriptive information that I am putting in place with a timeline for the project are as follows: Rosenblatt. (2012). Obtain Authorization To obtain documentation authorization you on the go ahead of the project, its planning, implementation, testing, and training of the system 1 Day Develop Plan Developing a project...

Words: 886 - Pages: 4

Premium Essay

Admission

...Does your career plan include a world of lifelong success? Program of Professional Studies THE CERTIFIED GENERAL ACCOUNTANTS ASSOCIATION OF BRITISH COLUMBIA We see more than numbers. Choose a career that places you on the path to lifelong success. It’s all about opportunity. Accounting professionals can work in any sector, anywhere in the world. And when you choose CGA, you’ll gain the leadership, problem-solving and technical skills that are sought after by organizations in the private, public and not-for-profit sectors. The CGA Program of Professional Studies gives you the tools to succeed in business, no matter where your career takes you. You’ll enter the workforce with the applied knowledge and demonstrated expertise that employers want, including specialized technical knowledge, sectorspecific competencies, problem-solving skills and the ethical integrity to lead. CGA’s competency-based curriculum is simply your best way to prepare for a rewarding career in financial management. Flexible study options and the freedom to choose the career you want CGA is all about choice. You choose the professional-studies path and real-world experience that best match your career goals and interests. We give you the skills and freedom to work in any type of organization, in any industry, at any level of management. With a CGA designation, your opportunities—both professional and personal, at home and around the world—are limitless. Take your place as a highly respected...

Words: 4906 - Pages: 20

Premium Essay

Access Control

...Running head: Dormitory Access Control Case Study: Dormitory Access Control Elizabeth Koch CIS 210 Dr Lopez Abstract As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system.  The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door.  Create a 3-4 page project plan for this project in which you: Project Scope Statement The Information Security team at Small University has been given the project to install an access control system (ACS) from Dynamics Security in a dormitory. The ACS will automatically unlock the doors via an electronic proximity reader and integrate with an existing security camera system. The existing cameras are designed to face and rotate to record a person as they use their identification card to unlock the doors. For this reason, the system will be designed in a way that the user will have three chances to unlock the door, if the user fails to unlock the door on the third attempt, then the alarm will go off. The ACS will also be designed to allow the security administrator to make changed for the ACS operations. These changes will be the camera positions, setting the alarm time, and setting the time the dormitory doors will lock. ...

Words: 755 - Pages: 4

Free Essay

Data Indexing for Heterogeneous Multiple Broadcast Channel

...Data Indexing for Heterogeneous Multiple Broadcast Channel Andrew Y. Ho and Dik Lun Lee Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Email: andrewho@cs.ust.hk, dlee@cs.ust.hk Abstract vision in the computing industry – from traditional wired This paper studies a heterogeneous multiple channel and stationary desktops to a fast growing area of mobile environment (HMCE), in which the channels are computing. The trend of using notebook computers, controlled by different wireless operators. To the best of palm-size computers, and personal digital assistants (PDA) our knowledge, there is no previous research on this is already in full swing. Furthermore, the enhancement in scenario. In this paper, we first present the architecture for reliability, transmission, and speed of wireless links HMCE which makes use of a centralized index server to facilitates the mobility of communication. Usually, a broadcast index information about the broadcast data on a wireless communication environment consists of two sets dedicated index channel. An analog can be drawn between of entities: a large number of users equipped with mobile HMCE and WWW: the wireless operators are web sites devices (mobile clients – MCs) and a relatively fewer and the index channel is Google; Google indexes web number of stationary mobile service stations (MSS) that pages so that...

Words: 5335 - Pages: 22

Premium Essay

Research on Factors Affecting Study Habit

...awareness of nursing as a profession by secondary school students in Ilala district, explore factors that promote aspiration to enroll in nursing schools and to explore factors that deter aspiration to enroll in nursing schools. Methods: The study was exploratory cross sectional using both qualitative and quantitative methods and was conducted in Azania and Jangwani secondary schools in Ilala district. The sample size included 50 male and 50 female students who were opting for Physics, Chemistry and Biology from form III to form VI in the above mentioned schools. Results: Awareness above 50% for males was 79.2% (95%CI: 66.6, 91.8) while that of females was 76.9 % (95% CI: 65.4, 88.4). Awareness below 50% was 31.4% (95%CI: 8.4, 54.4) for the males while that for females was 31.1% (95% CI: 11.3, 50.9). Non awareness was mostly about nurses being capable of independent practice, making decisions for themselves, working with high technology, following physician’s orders without questioning and feeling good about what they do. Factors that were pointed out included: social, economical, educational and individual perceptions of different students. Although students were aware of nursing, they did not want to opt to join the profession. Conclusion: This study has shown that students are at least aware of the profession but they do not want to opt for it due to the image they have of it from the public. The factors that have been addressed in this research have to be put in...

Words: 3205 - Pages: 13

Premium Essay

Adoption of Cellular Phone Technology

...Innovation Approach Muhammad Ashraf Khan Chairman, Department of Mass Communication, Bahauddin Zakariya University, Multan, Pakistan Email : ashraf_1963@yahoo.com Aqsa Iram Shahzadi Khan Lecturer, Department of Mass Communication, Bahauddin Zakariya University, Multan, Pakistan Email : mrsaqsairam@yahoo.com Abstract This paper focuses on the theory of adoption of cellular phone as an innovation and its diffusion and penetration in the Pakistani society and to confirm Roger’s theory of diffusion of innovation. More specifically, the study aims to test if five categories of adopters and five stages of adoption [as suggested by Roger (1976)] adequately explain the behavior of cellular phone users in Pakistan. The study also aims to evaluate the role played by advertising in the process of diffusion of innovation. An attempt is also made to study relationships among other variables of interest. To achieve its objectives, this study formulates the diffusion of innovation theory using survey research method from population of Pakistan(a sample of200 respondents are approached) and various statistical techniques are applied on the information gathered before drawing any conclusions. Our results support the theory of diffusion of innovation. We do not find an evidence to believe that advertising plays a statistically significant direct role in the process of diffusion of innovation, although we have not explored the extent of its indirect contribution in the process. Keywords:...

Words: 3818 - Pages: 16

Premium Essay

Greater Risk of Dementia When Spouse Has Dementia? the Cache County Study

...REPORTS Greater Risk of Dementia When Spouse Has Dementia? The Cache County Study [See editorial comments by Dr. Peter P. Vitaliano, pp 976–978] Maria C. Norton, PhD,abc Ken R. Smith, PhD,de Truls Østbye, MD, PhD,fgh JoAnn T. Tschanz, PhD,bc Chris Corcoran, ScD,ci Sarah Schwartz, MS,ci Kathleen W. Piercy, PhD,ac Peter V. Rabins, MD, MPH,j David C. Steffens, MD,k Ingmar Skoog, MD, PhD,l John C. S. Breitner, MD, MPH,mn Kathleen A. Welsh-Bohmer, PhD,g for the Cache County Investigators OBJECTIVES: To examine the effects of caring for a spouse with dementia on the caregiver’s risk for incident dementia. DESIGN: Population-based study of incident dementia in spouses of persons with dementia. SETTING: Rural county in northern Utah. PARTICIPANTS: Two thousand four hundred forty-two subjects (1,221 married couples) aged 65 and older. MEASUREMENTS: Incident dementia was diagnosed in 255 subjects, with onset defined as age when subject met Diagnostic and Statistical Manual of Mental Disorders, Third Edition, Revised, criteria for dementia. Cox proportional hazards regression tested the effect of time-dependent exposure to dementia in one’s spouse, adjusted for potential confounders. RESULTS: A subject whose spouse experienced incident dementia onset had a six times greater risk for incident dementia as subjects whose spouses were dementia free (hazard rate ratio (HRR) 5 6.0, 95% confidence interval (CI) 5 2.2–16.2, Po.001). In sex-specific analyses, husbands had higher risks From...

Words: 5331 - Pages: 22