Flylib.com
Protect Your Information with Intrusion Detection (Power)
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
Table of Contents
BackCover
Protect Your Information with Intrusion Detection
Introduction
Content Overview
Chapter 1: Introduction to Intrusion Detection
Information System Levels
Traditional Security Tools
Summary
Chapter 2: Anatomy of an Attack
Security Events
Vulnerabilities
Attacks
Incidents
Intruders
Summary
Chapter 3: Introduction to Intrusion Detection
Backing up Firewalls
Controlling File Access
Controlling Unreliable Employees and Preventing Information Leaks
Protection against Viruses
Controlling the Administrator s Activities
Controlling Internet Access
Detecting Unknown Devices
Analyzing the Efficiency of Firewall Settings
Analyzing Information Flows
Analyzing Data from Network Equipment
Collecting Proof and Handling Incidents
Performing Inventory and Creating a Network Map
Detecting Default Configurations
Controlling the Efficiency of the IT Department
Intrusion Detection Systems and Other Security Tools
Summary
Chapter 4: The Three Basic Principles of Intrusion Detection
Attack Indications
Sources of Information on Attacks
Summary
Chapter 5: Detecting Attack Traces
Control of File and Folder Integrity
Selecting Data on Important Files and Folders
Integrity Control for Files and Folders
Analysis of Log Files
Network Traffic Analysis
Notification Analysis
Analysis of Processes, Services, and Ports
Detecting Unauthorized Devices
Analysis of External Sources of Information and System Behavior
Summary
Chapter 6: Classification of Intrusion Detection Systems
Security Assessment Systems
Systems Searching for Design Vulnerabilities
Systems for Searching for Configuration Vulnerabilities
Classical Intrusion Detection Systems and Log-File Checkers
Introduction to Classification
Architecture of the Intrusion Detection System
Host-Level Intrusion Detection Systems
Network-Level Intrusion Detection Systems
Summary
Chapter 7: Anticipating Attacks, or Creating an Intrusion Detection Infrastructure
Training Personnel
Training Centers
On-Line Training
On-Line Seminars
Seminars and Conferences
Business Games
Certification of IS Professionals
Defining Security Policy and Procedures
Selecting and Using System and Network Logging Mechanisms
Generating Information for Consistency Checkers
Backing up Important Files and Directories
Summary
Chapter 8: The Life Cycle, Deployment, and Implementation of an IDS
Life Cycle of the IDS Infrastructure Project
Justifying Your Purchase
Bringing the IDS into Operation
Chapter 9: Selecting an Intrusion Detection System
Preliminary Analysis
Intrusion Detection System Customers
Evaluation Criteria
Testing
Summary
Chapter 10: Placement of the Intrusion Detection System
Placing IDS Sensors
Using IDS Sensors in Switched Networks
Placing the Security Scanner
Placement of Integrity Control Systems
Placing Management Consoles
Factors to Consider when Setting up an Intrusion Detection System
Chapter 11: Using Intrusion Detection Systems
Selecting the Correct Host for an IDS
Purchasing an IDS
Installation and Deployment
Specifying the Rules for Classical IDSs
Specifying the Rules for Security Scanners
Configuration of the Event Logging and Alerting Mechanisms
Strengthening IDS Security
Summary
Chapter 12: Common IDS Problems
General Problems
Network-Level Intrusion Detection Systems
Host-Level Intrusion Detection Systems
Summary
Chapter 13: Standardization in the Field of Intrusion Detection
The Adaptive Network Security Alliance
The Lincoln Laboratory Project
The OSEC Project
The Intrusion Detection Systems Consortium
Open Platform for Secure Enterprise Connectivity
The Common Content Inspection Standard
The Common Intrusion Detection Framework Project
The Intrusion Detection Working Group
The Common Vulnerabilities and Exposures Database
The ICAT Database
The Intrusion Data Library Enterprise Database
DARPA Projects
Chapter 14: Incident Response
Investigation of Unexpected Changes
Documenting all Failed Attempts
Summary
Appendix A: List of Ports Frequently Used by Trojans
Appendix B: List of Most Frequently Scanned Ports
Appendix C: List of Internet Address Ranges
Appendix D: List of First-Level Domains
Appendix E: List of Protocol Identifiers for IPv4
Bibliography
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J, K
Index_L
Index_M
Index_N
Index_O
Index_P, Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X, Y, Z
List of Figures
List of Tables
List of Code Examples
List of Sidebars
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Project Management Overview
The Project Manager
Essential Project Manager Toolkit
Project Plan Checklist
What Causes Unplanned Scope Changes?
Postfix: The Definitive Guide
Tracing a Message Through Postfix
The Problem of Spam
Postfix Anti-Spam Example
Postfix and TLS
Appendix B. Postfix Commands
C & Data Structures (Charles River Media Computer Engineering)
Address and Pointers
Recursion
Union
Files
Problems in Strings
Data Structures and Algorithms in Java
Summary
Advanced Linear Structures
Strings and StringBuilders
Explicit Memory Management
A.8. Operators
Special Edition Using Crystal Reports 10
Performance Monitoring and Tuning
Using Existing Crystal Reports as Templates
Installing the Crystal Repository
Approaching the Project
Troubleshooting
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Basic ImageReady Animation, Tweening, and Layer Styles
Photoshop Layers and After Effects
Color, Light, and Focus
Custom Scene Transitions
Appendix Adobe Photoshop and After Effects Resources
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies