Throughout the world computer networks are becoming more popular as more and more technology is being implemented into organizations in order to help employees process their work, and communicate with one another. Along with the ever growing technology the more possibilities of data and information getting stolen or lost by hackers attempting to access the networks in an organization. There are many systems out there that will help detect and alert an organization of the attacks or prevent attacks from happening. Systems known as intrusion detection systems (IDSs) and intrusion preventative systems (IPSs) do exactly that for an organization and when they are combined are known as Intrusion detection and prevention systems (IDPSs).
Intrusion detection system and intrusion prevention systems is what helps an organization get notified of an attack that is happening or one that is about to take place as well as helping them identify bad activity along the network. According to Webopedia (2014), “An intrusion detection system inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.” The intrusion prevention system is the system that can detect a possible intrusion and then prevent it from happening, and attacking the organization through active response. Intrusion prevention is what prevents an attack from taking place and detection is the systems, and processes that identify the attacks (Mattord & Whitman, 2013, p. 283).
One type of Intrusion detection prevention system is the network-based system. This kind of system is located on a computer or appliance that is connected to the organizations network as this is how it monitors the traffic along the network scanning for attacks (Mattord & Whitman, 2013, p. 288). According to Techopedia (2014), “Its main functions include protecting the network from threats, such as denial of service (DoS) and unauthorized usage.” Network based IDPSs is also mainly used to protect the confidentiality, integrity, and availability of the organization network (Mattord & Whitman, 2013, p. 288).
Another type of intrusion detection and prevention system is the Host-based IDPS. This system is different from the network-based system as it is located on a network segment compared to a computer or appliance. An additional aspect host-based IDPS does is that it keeps track of all the files a hacker creates, changes, or deletes from important system files. One advantage HIDPS has over NIDPS is that it can get into encrypted data that travel along the network and use the data to help prevent potential attacks (Mattord & Whitman, 2013, p. 292). Techopedia (2014) adds, “A host-based intrusion detection system is a system or a program employed to protect critical computer systems containing crucial data against viruses and other internet malware.” An additional feature of HIDPS is it can...