Skip to main content

Posts

Showing posts from February, 2025

Intrusion Detection System, Access Control and Auditing

  Intrusion Detection Systems  Intrusion Detection Systems (IDS) are critical tools used to safeguard a network by continuously monitoring for suspicious activities or security policy violations. They can analyse network traffic, user activities, and system behaviours to detect potential threats in real-time, alerting administrators to take action. There are two main types of IDS: ·        Host-Based IDS (HIDS): Operates on individual hosts or devices, monitoring system logs, file integrity, and application activities to detect anomalies or unauthorized actions on that specific device. ·        Network-Based IDS (NIDS): Monitors the entire network by examining packets of data transmitted over the network to identify unusual patterns or signs of attack. It provides a broader view, ensuring the security of the entire network infrastructure.   Access Control and Auditing Access control involves ...

Firewall

  Firewall A software firewall is a protective layer designed to filter incoming and outgoing network traffic on device. It monitors the flow of data to ensure that only safe and authorized information passes through, while blocking potential threats such as hackers, viruses, and malware. Here are a few reasons why you should install a software firewall on your personal device: Protection Against Unauthorized Access: A firewall helps to block unauthorized users from gaining access to your device over a network or the internet. Prevention of Malicious Software: Firewalls can block harmful software (malware) from entering and infecting your device. Control Over Network Activity: You can manage and monitor the network activity on your device, setting specific rules for which applications can access the network. Enhanced Privacy: Firewalls help protect your personal data from being transmitted to or from your device without your...