Lec 05- Implementing Security Applications

This module covers what applications should be there for ensuring security on end point and nework devices for different objectives.

This mudule covers:

  • HIDS/HIPS
  • Personal Firewall
  • Antivirus
  • Antispam
  • Antispyware

HIDS/HIPS vs NIDS/NIPS

Intrusion detection system IDS

IDS analyze copy of data from network and allow operations to complete as well. IDS is non blocking.

Intrusion prevention system.

IPS is blocking, and is installed inline. Throughput is decreased.

IIDS Characteristics

Software installed on hosts, and audit log files, file system, resources for anomalous behavior.

Personal firewall: is used to block/allow specific programs, services, ports. it is also used to block/allow access to configured IP Addresses, subnets. Examples of Personal firewall are zone alarm, windows firewall.

Antivirus is software used to scan system for viruses.

Antispam, this is normally feature of email server and email client software to check for spam emails.

Antispyware, this is software installed over system to detect spyware.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s