Please use this identifier to cite or link to this item:
http://hdl.handle.net/11189/3227
Title: | Information security, access controls and the reliability of intrusion detection systems | Authors: | Mlitwa, Nhlanhla Boyfriend Wilton Birch, Dwain |
Keywords: | Access control;Intrusion detection systems;Vulnerability;Security threats | Issue Date: | 2008 | Publisher: | International Information Management Corporation | Source: | Mlitwa, N. & Birch, D. (2008). Information security, access controls and the reliability of intrusion detection systems. In Proc. IST-Africa 2008 Conference Proceedings. Windhoek, Namibia | Abstract: | Information is power, and the control of access to confidential data is key to safeguarding an organisation’s edge in today’s competitve, information-based economy. While access control is like a useful fence around your house, there is always a risk of someone leaving the gate open or breaking the lock. Without additional security there is no way of knowing if security is/was breached. This study investigates the effectiveness of intrusion detection systems as an access control supplement in protecting electronic information resources and networks in infromation-centric organisations. The study focuses on the strengths and vulnerabilities of intrusion detection systems (IDS). A case study is conducted with a retail organisation, and an educational institution in Cape Town, South Africa to understand security priorities in retail, and the functionalities of IDSs, the significance of the system in concept, the cost factor, and whether it is really an answer to all possible security challenges. The findings are clear. No security measure is altogether “fool-proof”. Although IDSs have vulnerabilities, they offer an added cushion to conventional network access control efforts. Access control for example, guards the gate but IDSs are the watchdogs in your yard, and IDS closes a gap in a network security that only IDSs can. It alerts you of a potential attacker, enabling you to respond timeously, in whichever way you like. It does however require deliberate reaction against a detected intrusion to be effective, but remains a useful security tool that should become standard to all network security initiatives. | URI: | http://hdl.handle.net/11189/3227 | ISBN: | 978-1-905824-07-6 | Rights: | © Mlitwa, Birch & Dwain. 2008 |
Appears in Collections: | FID - Conference Proceedings |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Mlitwa_Nhlanhla_Birch_Dwain_FID_2008.pdf | Conference proceeding | 278.9 kB | Adobe PDF | View/Open |
Page view(s)
32
Last Week
0
0
Last month
0
0
checked on Feb 9, 2021
Download(s)
12
checked on Feb 9, 2021
Google ScholarTM
Check
Items in Digital Knowledge are protected by copyright, with all rights reserved, unless otherwise indicated.