Tuesday, 26 January 2021

Detection Techniques can help maintain Information security

Detection techniques can help to maintain Information Security. Precautions can be taken at early stage.


A security breach is any incident that results in unauthorised access to computer data, applications, network or devices. It results in information being accessed without authorisation. Typically, it occurs when an intruders is able to bypass security mechanisms.


Detection : the action of stopping something after detection of security breach


  1. Audit Logs
  2. Intrusion Detection System
  3. Honeypots


An audit log is a record of events and changes. IT devices across your network create logs based on events. Audit logs are records of these event logs, typically regarding a sequence of activities or a specific activity. Audit logs don't always operate in the same way. Event-based logs usually contain records describing system events, application events, or user events. 

Audit logs enable your security team to reconstruct events after a problem occurs. The documentation provides your security administrator with the information needed to recover rapidly from an intrusion. Security Audit Log to record security-related system information such as changes to user master records or unsuccessful logon attempts. 


An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. A hardware appliance or software designed to detect, alert on, and report malicious attacks and unauthorised misuse on a network or host. An IDS does not do anything about the attach, it simply raises and alert.


Honeypot is a host-based IDS where the entire system is created solely to monitor, detect, and capture security threats against. or it can be defines as  A honeypot is a computer or computer system intended to mimic likely targets of cyberattacks. It can be used to detect attacks or deflect them from a legitimate target. It can also be used to gain information about how cybercriminals operate.  Those honeypots can alert the security team when someone is poking around where they should not, he says. While honeypots have been used widely by researchers to study the methods of attackers, they can be very useful to defenders as well.



0 comments:

Post a Comment