You are on page 1of 13

e-Security Requirements for an e-Business

IDS and its Role

LAKSHMI PRIYA
MBA 7th Module
Roll No.: 1853364
E-Security
Requirements for
e-Business
Integrity Availability

Auditing or
Authentication
Traceability

Confidentiality
Requirement Non-
of e-Security Repudiation
Confidentiality
• Confidentiality involves making information accessible to
only authorized parties, or restricting information access to
unauthorized parties.
Authentication
• Authentication is making sure that the message senders or
principles are who they say they are.
Integrity
• The ability to protect data from being altered or destroyed
by unauthorized access or accidental manner.
• Transmitting information over the internet (or any other
network) is similar to sending a package by mail. The
package may travel across numerous trusted and untrusted
networks before reaching its final destination. It is possible
for the data to be intercepted and modified while in transit.
Availability
• Availability means that system resources are safeguard from
tampering and are available for authorized users at the time
and in the format needed.
Auditing or Traceability
• In an e-business security context, auditing is the process of
examining transactions.
• Trust is enhanced if users can be assured that transactions
can be traced from origin to completion.
Non-Repudiation
• Ensuring that principals cannot deny that they sent the
message.
• Thus the sender of the message should be able to prove to a
third party that the intended recipient got the message and
the recipient should be able to prove to a third party that the
originator did actually send the message.
IDS
(Intrusion Detection System)
IDS (Intrusion Detection System)
• An intrusion detection
system (IDS) is a type of
security software designed
to automatically alert
administrators when
someone or something is
trying to compromise
information system
through malicious
activities such as DDOS
Attacks or security policy
violations.
Role of IDS

An IDS detects attacks as soon as possible and takes


appropriate action.

An IDS does not usually take preventive measures


when an attack is detected.

It is a reactive rather than a pro-active agent.

It plays a role of informant rather than a police officer.

You might also like