Flylib.com
Protect Your Information with Intrusion Detection (Power)
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
Table of Contents
BackCover
Protect Your Information with Intrusion Detection
Introduction
Content Overview
Chapter 1: Introduction to Intrusion Detection
Information System Levels
Traditional Security Tools
Summary
Chapter 2: Anatomy of an Attack
Security Events
Vulnerabilities
Attacks
Incidents
Intruders
Summary
Chapter 3: Introduction to Intrusion Detection
Backing up Firewalls
Controlling File Access
Controlling Unreliable Employees and Preventing Information Leaks
Protection against Viruses
Controlling the Administrator s Activities
Controlling Internet Access
Detecting Unknown Devices
Analyzing the Efficiency of Firewall Settings
Analyzing Information Flows
Analyzing Data from Network Equipment
Collecting Proof and Handling Incidents
Performing Inventory and Creating a Network Map
Detecting Default Configurations
Controlling the Efficiency of the IT Department
Intrusion Detection Systems and Other Security Tools
Summary
Chapter 4: The Three Basic Principles of Intrusion Detection
Attack Indications
Sources of Information on Attacks
Summary
Chapter 5: Detecting Attack Traces
Control of File and Folder Integrity
Selecting Data on Important Files and Folders
Integrity Control for Files and Folders
Analysis of Log Files
Network Traffic Analysis
Notification Analysis
Analysis of Processes, Services, and Ports
Detecting Unauthorized Devices
Analysis of External Sources of Information and System Behavior
Summary
Chapter 6: Classification of Intrusion Detection Systems
Security Assessment Systems
Systems Searching for Design Vulnerabilities
Systems for Searching for Configuration Vulnerabilities
Classical Intrusion Detection Systems and Log-File Checkers
Introduction to Classification
Architecture of the Intrusion Detection System
Host-Level Intrusion Detection Systems
Network-Level Intrusion Detection Systems
Summary
Chapter 7: Anticipating Attacks, or Creating an Intrusion Detection Infrastructure
Training Personnel
Training Centers
On-Line Training
On-Line Seminars
Seminars and Conferences
Business Games
Certification of IS Professionals
Defining Security Policy and Procedures
Selecting and Using System and Network Logging Mechanisms
Generating Information for Consistency Checkers
Backing up Important Files and Directories
Summary
Chapter 8: The Life Cycle, Deployment, and Implementation of an IDS
Life Cycle of the IDS Infrastructure Project
Justifying Your Purchase
Bringing the IDS into Operation
Chapter 9: Selecting an Intrusion Detection System
Preliminary Analysis
Intrusion Detection System Customers
Evaluation Criteria
Testing
Summary
Chapter 10: Placement of the Intrusion Detection System
Placing IDS Sensors
Using IDS Sensors in Switched Networks
Placing the Security Scanner
Placement of Integrity Control Systems
Placing Management Consoles
Factors to Consider when Setting up an Intrusion Detection System
Chapter 11: Using Intrusion Detection Systems
Selecting the Correct Host for an IDS
Purchasing an IDS
Installation and Deployment
Specifying the Rules for Classical IDSs
Specifying the Rules for Security Scanners
Configuration of the Event Logging and Alerting Mechanisms
Strengthening IDS Security
Summary
Chapter 12: Common IDS Problems
General Problems
Network-Level Intrusion Detection Systems
Host-Level Intrusion Detection Systems
Summary
Chapter 13: Standardization in the Field of Intrusion Detection
The Adaptive Network Security Alliance
The Lincoln Laboratory Project
The OSEC Project
The Intrusion Detection Systems Consortium
Open Platform for Secure Enterprise Connectivity
The Common Content Inspection Standard
The Common Intrusion Detection Framework Project
The Intrusion Detection Working Group
The Common Vulnerabilities and Exposures Database
The ICAT Database
The Intrusion Data Library Enterprise Database
DARPA Projects
Chapter 14: Incident Response
Investigation of Unexpected Changes
Documenting all Failed Attempts
Summary
Appendix A: List of Ports Frequently Used by Trojans
Appendix B: List of Most Frequently Scanned Ports
Appendix C: List of Internet Address Ranges
Appendix D: List of First-Level Domains
Appendix E: List of Protocol Identifiers for IPv4
Bibliography
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J, K
Index_L
Index_M
Index_N
Index_O
Index_P, Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X, Y, Z
List of Figures
List of Tables
List of Code Examples
List of Sidebars
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
Cisco IOS Cookbook (Cookbooks (OReilly))
Extracting Hardware Inventory Information
Filtering BGP Routes Based on AS Paths
Using DLSw to Bridge Between Ethernet and Token Ring
Extracting Router Information via SNMP Tools
Limiting the Impact of IP Helper Addresses
Twisted Network Programming Essentials
Finding Answers to Your Questions
Working with POST Data from HTML Forms
Installing SOAP Libraries
Sharing Web Services with SOAP
Posting a Message to an NNTP Server
Extending and Embedding PHP
The Evolution of the PHP Object Type
Advanced Embedding
Appendix A. A Zend API Reference
Memory
Constants
.NET-A Complete Development Cycle
The Project Vision and Business Case
Refined Requirements for Online Photo Shop
Analysis of the Image Postprocessing Requirements
References for Further Reading
Wrap-Up
Comparing, Designing, and Deploying VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Advantages and Disadvantages of MPLS Layer 3 VPNs
Review Questions
Deploying IPsec Remote Access VPNs Using Preshared Key and Digital Signature Authentication
FileMaker 8 Functions and Scripts Desk Reference
Get(PreferencesPath)
Get(SystemVersion)
MiddleWords()
Seconds()
Custom Functions Primer
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies