Intrusion in Information Security
Intrusion in Information Security
Intrusion in Information Security
OR
“Intrusion is any act that compromises the security of a
system by unauthorized entities”
IMPORTANCE
Understanding intrusion in the context of information
security is crucial as it directly impacts the confidentiality,
integrity, and availability of critical data and resources.
With the rise of digital transformation, businesses and
individuals are more vulnerable to these attacks.
Effective measures against intrusion protect sensitive
data, maintain trust, and ensure uninterrupted
operations.
2013 TARGET DATA BREACH
INTRUSION
DoS/DDoS TECHNIQUES Phishing
OR
“Intrusion Detection Systems (IDS) monitor network or
system activities for malicious actions or security policy
violations, providing alerts for potential intrusions”
TYPES OF IDS
NETWORK-BASED IDS (NIDS) HOST-BASED IDS (HIDS)
• Network-based IDS (NIDS) monitors traffic across • Host-based IDS (HIDS) focuses on individual system or
entire networks host activities
• NIDS analyzes network packets in real-time • HIDS inspects files, logs, and system calls on a specific
device
• NIDS detects threats from external sources targeting • HIDS identifies internal threats specific to a single host
the network
• NIDS has broader coverage but may miss encrypted • HIDS provides deeper insight into host behavior but
traffic lacks overall network visibility
• NIDS is placed at key network points like routers • HIDS is installed on individual devices like servers or PCs
METHODS OF DETECTION
Signature-based Anamoly-based
Detection Detection
IDS ALERTS AND ERRORS
When an IDS detects suspicious activity, it
generates an alert, allowing the security team to
investigate and respond. This could involve
blocking malicious traffic, isolating affected
systems, or escalating the incident for further
analysis. In some cases, advanced IDS systems
may automatically respond to threats by taking
predefined actions such as blocking IP addresses
or shutting down compromised systems
INTRUSION PREVENTION SYSTEM
• Signature-based systems require regular updates to • Anomaly-based systems rely on baselines of normal
their threat databases behavior for detection
• Signature-based prevention has lower false positives • Anomaly-based prevention is more prone to false
but can miss zero-day attacks positives but excels at identifying unknown threats
• Signature-based systems are faster and less resource- • Anomaly-based systems require more computation to
intensive analyze deviations from normal behaviors
Limitations and Challenges of IPS:
• False Positives:
IPS can sometimes block legitimate traffic if it incorrectly identifies it as
malicious. These false positives can disrupt normal operations, so it's
important for IPS to be finely tuned to avoid overblocking
• Performance Impact:
Since IPS is deployed inline, it may introduce latency, especially in high-
traffic environments. The performance of IPS must be carefully
managed to ensure that it can scale with the network without
introducing unacceptable delays
Intrusion Detection and Prevention Systems
(IDPS)
Intrusion Detection and Prevention Systems
(IDPS) combine the functionality of both IDS and
IPS into one unified security solution. They
identify and prevent malicious activity, providing
real-time protection against cyber threats. IDPS
solutions actively monitor traffic and take action
to stop attacks while alerting security teams for
further investigation.
FEATURES OF IDPS:
• Behavioral and Signature-Based Detection:
IDPS uses a combination of signature-based and behavioral detection
techniques to identify threats. This ensures protection against known
vulnerabilities while also catching new, previously unseen attacks through
anomaly detection .
2. Regular Patching:
Keeping systems and software updated
3. Employee Training:
Educating about social engineering and phishing
attacks
• Duration: Attackers had access to the data for over two months before
detection
CONSEQUENCES
• Financial Cost: The breach cost Equifax over $700 million in settlement
claims, fines, and legal fees.