Should you hire an experienced hacker to protect your IT systems? Or is there such a thing as too much experience on the "dark side" of the law?
Should you hire an experienced hacker to protect your IT systems? Or is there such a thing as too much experience on the "dark side" of the law?
Introduction
As the wheel of time is rolling, the world is becoming more and more advanced. Advancement is visible in every field. Information and computer systems are now integral part of every organization. Efficient information system in any business, organization, company is important to make the flow of the information and dealings smooth. Introduction of different and advanced technological systems have make the work easy and proper.
As we all are aware of the fact that everything in this world comes off with some good and bad aspects associated with it. The issue that emerged with the advancement of information systems is the security. No one can deny the threats the computer world is facing. The most annoying of all is the intrusion. The systems when encounter intrusion from the outside world do not remain safe. The intruders from the outside world are commonly known as hackers. There are habitual as well as professional hackers present around us. These have specialized techniques and methods to intrude the systems, and once the system is intruded, this becomes a serious issue for the organization. Once the systems are intruded, then no one can assure the activities that could be performed using the data of the organization.
Intrusion Detection and Prevention System
The need for network and information security is deeply felt in the organizations. For the purpose of detection of these intruders or hackers, special systems have been designed called as intrusion detection system. These systems have further been modified and the characteristics of preventing the intrusion have also been made part of the systems. These are collectively called as intrusion detection and prevention system (IDPS).These systems are deployed to detect the network traffic, note the patterns of the traffic, analyze them through graphs and techniques and then make the decision about classifying them as a threat or not (Lister, 1995).
Threats to Information System
The information systems today face a great number of threats. If these intruders are not prevented they gain access to the personal information of users.