Practical Considerations to Get Started
With the advent of technology, almost all offices today rely on computers for data input, storage and processing. Thus, maintaining a secure computing environment amidst the increasing interconnectivity of computers via networks such as the internet remains to be a challenge (Fulp, 2009). This is one of the reasons why intrusion detection mechanisms were put in place.
Acquiring and maintaining an Intrusion Detection System (IDS) to prevent loss of data and other confidential information is expensive. Thus, a clear evaluation of benefits against the cost is necessary before deciding to purchase the system. One can start by looking at previous records of intrusion and valuating business loss from such intrusion. This could be in terms of production downtime or bad publicity leading to a decrease in stock price. If the benefits outweigh the cost, it is recommended for that company to purchase IDS.
For companies handling lots of confidential information, IDS can also be a useful investment in Data Loss Prevention (DLP). Solutions to DLP are often very expensive and usually requires additional staff (Bandy, et.al., 2012). Having an IDS that can prevent the leak of confidential information such as social security and credit card numbers is highly recommended in such cases.
References:
Brandy, P., Money, M., & Worstell, K. (2012, May 31). General format. Retrieved from http://www.sans.org/security-resources/idfaq/getting_started.php
Fulp, E.W. (2009). Chapter 21, Firewalls. In Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA: Morgan Kaufmann Publishers.