Can proactive monitoring effectively combat unauthorized IT system activities? This paper explores the principles of intrusion monitoring and presents a conceptual architecture for a real-time Intrusion Monitoring System (IMS). Addressing the limitations of traditional authentication methods, the IMS aims to provide proactive monitoring and automatic responses to suspected security breaches. The paper describes the main functional elements of the IMS architecture and discusses practical implementation considerations. It examines the potential advantages and disadvantages of this approach, offering insights into its effectiveness. This research suggests that an IMS-type system could complement conventional security controls. While not a complete replacement, it offers an effective means to enhance protection and improve overall IT security. The study's findings have important implications for organizations seeking to strengthen their defenses against both external and internal threats.
This paper contributes to the field of information security and computer security, consistent with the scope of Information Management & Computer Security. By proposing a conceptual architecture for intrusion monitoring, it addresses the ongoing challenges of safeguarding IT systems from unauthorized activities, a central theme within the journal.