Web-Based Analysis Intrusion Detection System

Topic: Business Analysis
Words: 1124 Pages: 2

This task analyzes the web-based analysis intrusion detection system. In this case, it is a kind of software for monitoring the network and preventing intrusion threats. This system requires a second stage of intrusion identification with the help of the network administrator directly. In addition, this system can visually represent data obtained as a result of intellectual analysis. When creating and supervising this project, a developer must also adhere to the ACS code and its six main points.

This software completely repeats the first paragraph of this code, as it notifies the program’s client about unwanted intrusion and potential conflict. In general, the program is aimed at confidentiality and security and, therefore, should fully meet its functions. According to the second point, which is responsible for improving the quality of life, in this system, it is necessary to minimize any probability of error, in other words, a negative impact, which is a side effect of almost any ICT development (ACS, 2014). Responding to competence, this system must perform its primary function without encroaching on additional functionality if the developer cannot provide one hundred percent implementation, continuity, and security of these options. In addition, professional development is a critical point of the code in the development of this kind of software. The growing number of different algorithms and types of threats requires constant monitoring and updating of the corresponding software. The further fate of the application depends on the need to follow the development in one’s professional field. The client base will only grow if the developer supports it and works with the newest types of intrusions.

Failure to apply the code accordingly can lead to negative consequences. Disregard security calls into question the primary function of this program. The general functionality of the program should be verified and well-developed, without unnecessary options that can unnecessarily load the program and the user interface, further development, and maintenance. Finally, a stop in the professional development of developers and, consequently, the software can lead to negative consequences for users. New intrusion algorithms, new approaches in logging and analysis, attack blocking, and port scanning require constant study not only in order to maintain the primary function of this program but also to speed up its operation, speed, user interface convenience, and low hardware requirements.

As a member of the group, as a developer, I will, first of all, follow my professional development and support this undertaking among colleagues in every possible way. A detailed study of this topic, deeper analysis, and search for new solutions can help create a unique product on the market, which already has many similar products, such as Snort, Suricata, and Kismet. Each of the listed programs is open source, which a developer can use for educational purposes. Do not forget about one of the first paragraphs of the code, which indicates respect for someone else’s intellectual work. Consequently, ongoing training can allow creating a new solution in an already well-studied market, as well as keep an eye on new types of threats. Understanding the technologies that try to scan ports, the name of the operating system, and other attempts to read confidential information allows creating quality protection. However, this approach is reactive, which does not detract from its merits. Ideally, it is necessary to strive for a proactive approach, with the help of which it is possible to chop off any channels and possibilities of threats and intrusions into the network.

Traffic analysis in IT networks, as well as packet registration, are the main functions of an intrusion prevention system. Analysis and registration can be carried out in different ways, each of which can be improved to a certain extent. In the analysis, there are systematic approaches, methods from the analysis of big data. Registration also takes place using various technologies, including neural networks and expert systems. Consequently, as a team member, ongoing training is imperative for me to keep abreast of new products and to understand the basics of how such programs work.

As a team leader, again, I would encourage and provide all kinds of training. Since this technology has become famous for a long time and there have not been any fundamentally new developments in it for more than ten years, in order to make a worthy product, it is necessary to throw a lot of energy and opportunities into training personnel. In addition, the development of the application itself should not take much time since, with proper preparation, this program does not require voluminous writing code and designing a complex multi-window user interface. This software requires knowledge of networking and telecommunications, object-oriented programming, and information security. The latter aspect corresponds to the category of confidentiality and security prescribed in the first paragraph of the code.

The above will ensure compliance with the most important – the fifth – clause of the Code on Continuous Professional Development. As a result of following this point, as a team leader, I will personally and with the help of other testers monitor the implementation of the first, second and fourth points of the code. The first and fourth paragraphs define the primary function of the program and its boundaries. As a result, this system will be competent if it copes with its main task and does not provide too much unnecessary functionality. Reducing the negative consequences of ICT development to a minimum is in line with the second paragraph of the code on improving the quality of life.

Finally, as a team leader, I will be responsible for the sixth clause of this code – professionalism. It is in my interest to ensure a good atmosphere within the team that is completely free of discrimination, harassment, and other violations of ethical standards. Keeping calm and informative in this case on my part should set an example for the rest of the staff if any misconduct is detected. In part, this method is consistent with the methodology of transformational leadership. It is also necessary to protect employees from any adverse external influences from higher management or customers on the leader’s side. Any encroachment on the restriction of diversity in the workplace and the team’s atmosphere must be prevented and addressed by the code.

Moreover, I am interested in spreading knowledge and ideas about ICT within society, students to distribute the product, introducing popular science, and preparing candidates for future jobs of my development studio. Finally, the complete set of measures indicated will contribute to the very last paragraph of the code, which states that every member of the profession should protect its interests and be proud of them. Professionalism is a vital point of the code from the manager’s point of view, and the success of the entire project depends on its successful implementation.

Reference

ACS. (2014). ACS Code of Professional Conduct. Australian Computer Society. Web.