Tuesday, April 9, 2019
Machine Learning Interview Questions and Answers with Advanced
Cloud Network
April 09, 2019
Providing on the Web, online library and learning platform for IT Professional Developers with a unique blend of original content, peer-to-peer advice from the largest community of IT.
Tuesday, April 2, 2019
Intrusion Detection Systems (IDS)
Cloud Network
April 02, 2019
What is Intrusion detection systems (IDS) ?
An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities or through security policy violations.
An IDS works by monitoring system activity through examining vulnerabilities in the system, the integrity of files and conducting an analysis of patterns based on already known attacks. It also automatically monitors the Internet to search for any of the latest threats which could result in a future attack.
What are different types of intrusion detection systems ?
1. Active and Passive IDS (APIDS).
2. Network Intrusion detection systems (NIDS) and
3. Host Intrusion detection systems (HIDS)
1. Active (AIDS)
An active Intrusion Detection Systems (IDS) is also known as Intrusion Detection and Prevention System (IDPS). Intrusion Detection and Prevention System (IDPS) is configured to automatically block suspected attacks without any intervention required by an operator. Intrusion Detection and Prevention System (IDPS) has the advantage of providing real-time corrective action in response to an attack.
Passive (PIDS)
A passive IDS is a system that’s configured to only monitor and analyze network traffic activity and alert an operator to potential vulnerabilities and attacks. A passive IDS is not capable of performing any protective or corrective functions on its own.
2. Network Intrusion detection systems (NIDS).
Network Intrusion Detection Systems (NIDS) usually consists of a network appliance (or sensor) with a Network Interface Card (NIC) operating in promiscuous mode and a separate management interface. The IDS is placed along a network segment or boundary and monitors all traffic on that segment.
3. Host Intrusion detection systems (HIDS).
A Host Intrusion Detection Systems (HIDS) and software applications (agents) installed on workstations which are to be monitored. The agents monitor the operating system and write data to log files and/or trigger alarms. A host Intrusion detection systems (HIDS) can only monitor the individual workstations on which the agents are installed and it cannot monitor the entire network. Host based IDS systems are used to monitor any intrusion attempts on critical servers.
The drawbacks of Host Intrusion Detection Systems (HIDS) are
• Difficult to analyse the intrusion attempts on multiple computers.
• Host Intrusion Detection Systems (HIDS) can be very difficult to maintain in large networks with different operating systems and configurations
• Host Intrusion Detection Systems (HIDS) can be disabled by attackers after the system is compromised.
Providing on the Web, online library and learning platform for IT Professional Developers with a unique blend of original content, peer-to-peer advice from the largest community of IT.
Friday, March 29, 2019
ONGC Recruitment For 785 Vacancies Announced : Check Out Full Details Here
Cloud Network
March 29, 2019
Providing on the Web, online library and learning platform for IT Professional Developers with a unique blend of original content, peer-to-peer advice from the largest community of IT.
Thursday, March 28, 2019
How to Update Samsung Galaxy A7 2018 From Andorid 8.0 to Android 9.0 Pie with One UI Beta
Cloud Network
March 28, 2019
Providing on the Web, online library and learning platform for IT Professional Developers with a unique blend of original content, peer-to-peer advice from the largest community of IT.
Tuesday, March 26, 2019
5 Best Gaming Laptops Under ₹.75,000/- in India
Cloud Network
March 26, 2019
Here is the list of gaming laptop :
1. Acer Predator Helios 300: Available for ₹. 63,990.
2. Acer Nitro 5 AN515-52: Available for ₹. 75,990.
3. ASUS TUF FX 570: Available for ₹. 55,990.
4. Dell G3 3579: Available for ₹. 74,990.
5. Lenovo Legion Y530: Available for ₹. 76,990.
6. MSI GV62: Available for ₹. 1 Lakh.
1. Acer Predator Helios 300: Available for ₹. 63,990.
Processor: Intel i5 8th Gen processor.
Graphics Card: NVIDIA Geforce GTX 1050Ti GPU (4GB GDDR5)
RAM: 8GB
SSD: 128GB
HDD: 1TB
OS: W10
2. Acer Nitro 5 AN515-52: Available for ₹. 75,990.
Processor: Intel i7 8th Gen processor.
Graphics Card: NVIDIA Geforce GTX 1050Ti GPU (4GB GDDR5)
RAM: 8GB DDR4
SSD: 128GB
HDD: 1TB
OS: W10
3. ASUS TUF FX 570: Available for ₹. 59,990.
Processor: Intel i5 8th Gen processor.
Graphics Card: NVIDIA Geforce GTX 1050 GPU (4GB GDDR5)
RAM: 8GB DDR4
SSD: 128GB
HDD: 1TB
OS: W10
4. Dell G3 3579: Available for ₹. 74,990.
Processor: Intel i5 8th Gen processor.
Graphics Card: NVIDIA Geforce GTX 1050 GPU (4GB GDDR5)
RAM: 8GB DDR4
SSD: 128GB
HDD: 1TB
OS: W10
5. Lenovo Legion Y530: Available for ₹. 76,990.
Processor: Intel i5 8th Gen processor.
Graphics Card: NVIDIA Geforce GTX 1050 GPU (4GB GDDR5)
RAM: 8GB DDR4
SSD: 128GB
HDD: 1TB
OS: W10
6. MSI GV62
Processor: Intel i7 8th Gen processor.
Graphics Card: NVIDIA Geforce GTX 1060 GPU (6GB GDDR5)
RAM: 16GB DDR4
SSD: 128GB
HDD: 1TB
OS: W10
Providing on the Web, online library and learning platform for IT Professional Developers with a unique blend of original content, peer-to-peer advice from the largest community of IT.
Saturday, March 23, 2019
Slow Wi Fi at Home | Here is 5 Tricks Help to Boost Slow Wi Fi Internet ...
Cloud Network
March 23, 2019
Providing on the Web, online library and learning platform for IT Professional Developers with a unique blend of original content, peer-to-peer advice from the largest community of IT.
KTM Duke 125, 200, 250 and 390: Specification and Comparison
Cloud Network
March 23, 2019
Providing on the Web, online library and learning platform for IT Professional Developers with a unique blend of original content, peer-to-peer advice from the largest community of IT.