Flylib.com
Protect Your Information with Intrusion Detection (Power)
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
Table of Contents
BackCover
Protect Your Information with Intrusion Detection
Introduction
Content Overview
Chapter 1: Introduction to Intrusion Detection
Information System Levels
Traditional Security Tools
Summary
Chapter 2: Anatomy of an Attack
Security Events
Vulnerabilities
Attacks
Incidents
Intruders
Summary
Chapter 3: Introduction to Intrusion Detection
Backing up Firewalls
Controlling File Access
Controlling Unreliable Employees and Preventing Information Leaks
Protection against Viruses
Controlling the Administrator s Activities
Controlling Internet Access
Detecting Unknown Devices
Analyzing the Efficiency of Firewall Settings
Analyzing Information Flows
Analyzing Data from Network Equipment
Collecting Proof and Handling Incidents
Performing Inventory and Creating a Network Map
Detecting Default Configurations
Controlling the Efficiency of the IT Department
Intrusion Detection Systems and Other Security Tools
Summary
Chapter 4: The Three Basic Principles of Intrusion Detection
Attack Indications
Sources of Information on Attacks
Summary
Chapter 5: Detecting Attack Traces
Control of File and Folder Integrity
Selecting Data on Important Files and Folders
Integrity Control for Files and Folders
Analysis of Log Files
Network Traffic Analysis
Notification Analysis
Analysis of Processes, Services, and Ports
Detecting Unauthorized Devices
Analysis of External Sources of Information and System Behavior
Summary
Chapter 6: Classification of Intrusion Detection Systems
Security Assessment Systems
Systems Searching for Design Vulnerabilities
Systems for Searching for Configuration Vulnerabilities
Classical Intrusion Detection Systems and Log-File Checkers
Introduction to Classification
Architecture of the Intrusion Detection System
Host-Level Intrusion Detection Systems
Network-Level Intrusion Detection Systems
Summary
Chapter 7: Anticipating Attacks, or Creating an Intrusion Detection Infrastructure
Training Personnel
Training Centers
On-Line Training
On-Line Seminars
Seminars and Conferences
Business Games
Certification of IS Professionals
Defining Security Policy and Procedures
Selecting and Using System and Network Logging Mechanisms
Generating Information for Consistency Checkers
Backing up Important Files and Directories
Summary
Chapter 8: The Life Cycle, Deployment, and Implementation of an IDS
Life Cycle of the IDS Infrastructure Project
Justifying Your Purchase
Bringing the IDS into Operation
Chapter 9: Selecting an Intrusion Detection System
Preliminary Analysis
Intrusion Detection System Customers
Evaluation Criteria
Testing
Summary
Chapter 10: Placement of the Intrusion Detection System
Placing IDS Sensors
Using IDS Sensors in Switched Networks
Placing the Security Scanner
Placement of Integrity Control Systems
Placing Management Consoles
Factors to Consider when Setting up an Intrusion Detection System
Chapter 11: Using Intrusion Detection Systems
Selecting the Correct Host for an IDS
Purchasing an IDS
Installation and Deployment
Specifying the Rules for Classical IDSs
Specifying the Rules for Security Scanners
Configuration of the Event Logging and Alerting Mechanisms
Strengthening IDS Security
Summary
Chapter 12: Common IDS Problems
General Problems
Network-Level Intrusion Detection Systems
Host-Level Intrusion Detection Systems
Summary
Chapter 13: Standardization in the Field of Intrusion Detection
The Adaptive Network Security Alliance
The Lincoln Laboratory Project
The OSEC Project
The Intrusion Detection Systems Consortium
Open Platform for Secure Enterprise Connectivity
The Common Content Inspection Standard
The Common Intrusion Detection Framework Project
The Intrusion Detection Working Group
The Common Vulnerabilities and Exposures Database
The ICAT Database
The Intrusion Data Library Enterprise Database
DARPA Projects
Chapter 14: Incident Response
Investigation of Unexpected Changes
Documenting all Failed Attempts
Summary
Appendix A: List of Ports Frequently Used by Trojans
Appendix B: List of Most Frequently Scanned Ports
Appendix C: List of Internet Address Ranges
Appendix D: List of First-Level Domains
Appendix E: List of Protocol Identifiers for IPv4
Bibliography
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J, K
Index_L
Index_M
Index_N
Index_O
Index_P, Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X, Y, Z
List of Figures
List of Tables
List of Code Examples
List of Sidebars
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
MySQL Stored Procedure Programming
Date and Time Functions
Creating Stored Functions
Using Stored Programs in ASP.NET
Conclusion
How MySQL Processes SQL
ERP and Data Warehousing in Organizations: Issues and Challenges
The Effects of an Enterprise Resource Planning System (ERP) Implementation on Job Characteristics – A Study using the Hackman and Oldham Job Characteristics Model
Distributed Data Warehouse for Geo-spatial Services
Intrinsic and Contextual Data Quality: The Effect of Media and Personal Involvement
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Development of Interactive Web Sites to Enhance Police/Community Relations
Documenting Software Architectures: Views and Beyond
P.5. Viewtypes and Styles
Summary Checklist
How to Document Behavior: Notations and Languages
Module Layered View
C&C Shared-Data View
SQL Hacks
Hack 20. Uncover Trends in Your Data
Hack 31. Disaggregate a COUNT
Hack 40. Calculate Rank
Hack 71. Extract Lots of Rows
Hack 99. Dont Run Out of Disk Space
Microsoft VBScript Professional Projects
VBScript Objects
Developing Script Log Analyzers
Project Case Study Creating a Centralized Report Management Station
Designing the Web Site
Converting Reports to HTML Pages
Understanding Digital Signal Processing (2nd Edition)
DECIMATION
A/D CONVERTER TESTING TECHNIQUES
THE SLIDING DFT
TIME-DOMAIN INTERPOLATION USING THE FFT
Section G.1. FREQUENCY RESPONSE OF A COMB FILTER
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies