Internet/Network Security/Securing your Identity

Advertisement


Question
What are some mechanisms to detecting intrusion? How could this relate to securing your identity on cyberspace?

Answer
Hi, Lilly. Sorry for the long delay.

How to detect intrusion?

The thing here is to use IDS (Intrusion Detection Systems). Depending on the nature of using (home or corporate), IDS can be either a program or an equipment or both.
There are some appliances (hardware + software) very expensive and other free tools.

I suggest you to read this: http://en.wikipedia.org/wiki/Intrusion_detection_system

Basically IDS monitors the network during a time specified or configured and alerts when something suspicious occurs.
Read also about honeypots: http://en.wikipedia.org/wiki/Honeypot_(computing)

Well, I would relate this to securing identity, becase detecting intrusion is a way to defend yourself from being hacked or having your information stolen.
However, in the cyberworld unauthorized activity is much more difficult to detect than in the physical world, because computer systems often offer around-the-clock service. An unauthorized building entry at 2 a.m. would set off alarms, but computer network activity at the same hour may be innocuous.

Hope it helps.  

Internet/Network Security

All Answers


Answers by Expert:


Ask Experts

Volunteer


Denis Mello

Expertise

I understand the principles and the application of Network managament, from the OSI schema to mechanisms of detection, intrusion, security issues and vulnerabilities, how-to-attack and defend from crackers. I always look to be updated with the latest security holes. I also know OS like Windows 2k, 2k3, Linux, HP-UX and Solaris as best as other platforms.

Experience


Past/Present clients
General Motors, VIVO, Petrobras, OptiGlobe, Brazil Telecom, Hewlett-Packard.

©2016 About.com. All rights reserved.