Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Ch 7 IDS AC & Other Sec Tools

Ch 7 IDS AC & Other Sec Tools

Ratings: (0)|Views: 3,301|Likes:
information security unit 5
information security unit 5

More info:

Published by: Nishanth Krishnamurthy on May 12, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less

12/05/2012

pdf

text

original

 
Principles of Information Security, 2nd edition1
Intrusion Detection, Access Controland Other Security Tools
 
Principles of Information Security, 2nd edition2
L
earning Objectives
Upon completion of this material, you should be able to:
Identify and describe the categories and operatingmodels of intrusion detection systems
Identify and describe honey pots, honey nets, andpadded cell systems
L
ist and define the major categories of scanning andanalysis tools, and describe the specific tools usedwithin each of these categories
Discuss various approaches to access control
 
Principles of Information Security, 2nd edition3
Introduction
Intrusion: type of attack on information assets in whichinstigator attempts to gain entry into or disrupt system withharmful intent
Intrusion detection: consists of procedures and systems createdand operated to detect system intrusions
Intrusion reaction: encompasses actions an organizationundertakes when intrusion event is detected
Intrusion correction activities: finalize restoration of operationsto a normal state
Intrusion prevention: consists of activities that seek to deter anintrusion from occurring

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->