ABSTRACT

Intrusion in information system security simply means the attempts or actions of unauthorized entry

into an IT system. This action ranges from a reconnaissance attempt to map any existence of vulnerable

services, exploitation/real attack, and finally the embedding of backdoors. Such a malicious process can

result in the creation of an illegal account with administrator privilege upon the victim machine.

Actually, there have been several approaches or technologies designed to prevent such unwanted actions.

Hence, the intrusion prevention system (IPS) is really not something new in the world of information

system security. Some examples of prevention approaches or systems in existence today include anti-

virus, strong authentication, cryptography, patch management, and firewalls. Anti-virus systems exist to

prevent malicious programs such as viruses, worms, backdoor programs, etc. from successfully being

embedded or executed within a particular system. Patch management ensures effective deployment of the

latest security fixes/patches so as to prevent system vulnerabilities from successfully being exploited.

Firewalls exist to prevent unwanted access to some particular systems. Cryptography exists to prevent any

attempts to disclose or compromise sensitive information. Strong authentication exists to prevent any

attempts to fake an identity in an effort to enter a particular system.