Protect Your Information with Intrusion Detection (Power)


So, you have finally managed to prove the necessity of deploying an intrusion detection system, succeeded in convincing management to purchase one, and started to deploy the intrusion detection infrastructure in your company. However, it is most likely that as soon as you begin implementing your plans, you will encounter quite a few difficulties and problems whose existence you did not even suspect. The more sophisticated your project, the more problems you will have to solve. It is commonly thought that intrusion detection systems are much easier to deploy and bring into operation than ERP or CRM systems. This is not the case, however. Creating a viable intrusion detection infrastructure according to the principles discussed in previous chapters is a rather difficult task, and you must consider and approach it seriously.

The well-known Lerman's Law of Technology states that "Any techical problem can be overcome given enough time and money." Lerman's Corollary goes on to say: "You are never given enough time or money." It is practically impossible to do anything quickly, cheaply, and well. Achieving the ideal simultaneously in all three areas is impossible. In most cases, even the goal of attaining the ideal of two of parameters can only rarely be achieved. Thus, the best approach is to choose a single criterion to take priority in your work (Fig. 8.2).

Fig. 8.2. The criteria to be used during deployment and implementation

Thus, when deploying an IDS infrastructure and bringing it into operation, it is necessary to adopt some well-known approaches and principles used to deploy other complex systems. In particular, you must do the following:


Категории