Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
0 of .
Results for:
No results containing your search query
P. 1
Ch 7 IDS AC & Other Sec Tools

Ch 7 IDS AC & Other Sec Tools

Ratings: (0)|Views: 3,301|Likes:
information security unit 5
information security unit 5

More info:

Published by: Nishanth Krishnamurthy on May 12, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less





Principles of Information Security, 2nd edition1
Intrusion Detection, Access Controland Other Security Tools
Principles of Information Security, 2nd edition2
earning Objectives
Upon completion of this material, you should be able to:
Identify and describe the categories and operatingmodels of intrusion detection systems
Identify and describe honey pots, honey nets, andpadded cell systems
ist and define the major categories of scanning andanalysis tools, and describe the specific tools usedwithin each of these categories
Discuss various approaches to access control
Principles of Information Security, 2nd edition3
Intrusion: type of attack on information assets in whichinstigator attempts to gain entry into or disrupt system withharmful intent
Intrusion detection: consists of procedures and systems createdand operated to detect system intrusions
Intrusion reaction: encompasses actions an organizationundertakes when intrusion event is detected
Intrusion correction activities: finalize restoration of operationsto a normal state
Intrusion prevention: consists of activities that seek to deter anintrusion from occurring

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->