Please use this identifier to cite or link to this item: http://hdl.handle.net/11189/3227
Title: Information security, access controls and the reliability of intrusion detection systems
Authors: Mlitwa, Nhlanhla Boyfriend Wilton
Birch, Dwain
Keywords: Access control;Intrusion detection systems;Vulnerability;Security threats
Issue Date: 2008
Publisher: International Information Management Corporation
Source: Mlitwa, N. & Birch, D. (2008). Information security, access controls and the reliability of intrusion detection systems. In Proc. IST-Africa 2008 Conference Proceedings. Windhoek, Namibia
Abstract: Information is power, and the control of access to confidential data is key to safeguarding an organisation’s edge in today’s competitve, information-based economy. While access control is like a useful fence around your house, there is always a risk of someone leaving the gate open or breaking the lock. Without additional security there is no way of knowing if security is/was breached. This study investigates the effectiveness of intrusion detection systems as an access control supplement in protecting electronic information resources and networks in infromation-centric organisations. The study focuses on the strengths and vulnerabilities of intrusion detection systems (IDS). A case study is conducted with a retail organisation, and an educational institution in Cape Town, South Africa to understand security priorities in retail, and the functionalities of IDSs, the significance of the system in concept, the cost factor, and whether it is really an answer to all possible security challenges. The findings are clear. No security measure is altogether “fool-proof”. Although IDSs have vulnerabilities, they offer an added cushion to conventional network access control efforts. Access control for example, guards the gate but IDSs are the watchdogs in your yard, and IDS closes a gap in a network security that only IDSs can. It alerts you of a potential attacker, enabling you to respond timeously, in whichever way you like. It does however require deliberate reaction against a detected intrusion to be effective, but remains a useful security tool that should become standard to all network security initiatives.
URI: http://hdl.handle.net/11189/3227
ISBN: 978-1-905824-07-6
Rights: © Mlitwa, Birch & Dwain. 2008
Appears in Collections:FID - Conference Proceedings

Files in This Item:
File Description SizeFormat 
Mlitwa_Nhlanhla_Birch_Dwain_FID_2008.pdfConference proceeding278.9 kBAdobe PDFView/Open
Show full item record

Page view(s)

17
Last Week
0
Last month
0
checked on Oct 19, 2018

Download(s)

3
checked on Oct 19, 2018

Google ScholarTM

Check


Items in Digital Knowledge are protected by copyright, with all rights reserved, unless otherwise indicated.