Order Number |
636738393092 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Network Intrusion Enterprise Discussion
Professional Plagiarism Free Paper in APA/MLA/Harvard/Turabian Format, Instant Delivery, High Quality Submissions, 100% Unique, Turnitin Report Attached
by Irina Dave
Before going into a detailed report about a target of Network Intrusion, I will give an overview of Network Intrusion. A Network Intrusion is an unauthorized activity of a computer in an enterprise or an address in an assigned domain. Intrusions can come from outside or inside structures.
Network Intrusion Enterprise Discussion
On September 8, 2018, Marriott Hotels received an alert from a security tool about an attempt to access the Starwood guest reservation database in the USA. After getting the news, Marriott arranged security experts to help with the System Intrusion. The security experts found that an unauthorized party had copied and encrypted information and took steps towards removing it. On November 19, 2018, Marriott decrypted the information and found that the contents were from the Starwood guest reservation database. Marriott revealed that the Starwood network had been compromised since at least 2014, but it seems the first alert – or at least the first alert the security team caught – did not come till September 2018 (awake security, 2021). Moreover, it took two and a half months for attackers to do the encryption. According to Marriott, the Intrusion happened after four years so for them it was a positive thing.
An Intrusion Detection System (IDS) is a system that surveys a network for malicious activities and issues alert when it uncovers any such activity (Gaylord, 2019). The threat is reported to the administrator. Two types of Intrusion Detection Systems are Network Intrusion Detection Systems (NIDS) and Host Intrusion Detection Systems (HIDS). NIDS is placed at a strategic point to examine the traffic from all devices on the network. HIDS runs on self-standing hosts or devices on the network. It takes a snapshot of files and systems. If files are altered or deleted, it sends an alert to the administrator. Intrusion Prevention Systems (IPS) monitor network and system activities and if they find a malicious activity, they gather information, report it and block it. IPS are supplements for IDS. IPS can take early actions like alarming and traffic blocking.
I feel that, if associated IDS and IPS are installed in a system then it becomes safe to protect the system and network from intrusion.
References:
3 Takeaways from the Marriott & Starwood Breach. Awake Security. (2021, May 19). https://awakesecurity.com/blog/3-takeaways-from-the-marriott-starwood-breach/.
Gaylord, I. (2019, November 13). Network Intrusion: How to Detect and Prevent It. United States Cybersecurity Magazine. https://www.uscybersecurity.net/network-intrusion/.