Flylib.com
Protect Your Information with Intrusion Detection (Power)
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
Table of Contents
BackCover
Protect Your Information with Intrusion Detection
Introduction
Content Overview
Chapter 1: Introduction to Intrusion Detection
Information System Levels
Traditional Security Tools
Summary
Chapter 2: Anatomy of an Attack
Security Events
Vulnerabilities
Attacks
Incidents
Intruders
Summary
Chapter 3: Introduction to Intrusion Detection
Backing up Firewalls
Controlling File Access
Controlling Unreliable Employees and Preventing Information Leaks
Protection against Viruses
Controlling the Administrator s Activities
Controlling Internet Access
Detecting Unknown Devices
Analyzing the Efficiency of Firewall Settings
Analyzing Information Flows
Analyzing Data from Network Equipment
Collecting Proof and Handling Incidents
Performing Inventory and Creating a Network Map
Detecting Default Configurations
Controlling the Efficiency of the IT Department
Intrusion Detection Systems and Other Security Tools
Summary
Chapter 4: The Three Basic Principles of Intrusion Detection
Attack Indications
Sources of Information on Attacks
Summary
Chapter 5: Detecting Attack Traces
Control of File and Folder Integrity
Selecting Data on Important Files and Folders
Integrity Control for Files and Folders
Analysis of Log Files
Network Traffic Analysis
Notification Analysis
Analysis of Processes, Services, and Ports
Detecting Unauthorized Devices
Analysis of External Sources of Information and System Behavior
Summary
Chapter 6: Classification of Intrusion Detection Systems
Security Assessment Systems
Systems Searching for Design Vulnerabilities
Systems for Searching for Configuration Vulnerabilities
Classical Intrusion Detection Systems and Log-File Checkers
Introduction to Classification
Architecture of the Intrusion Detection System
Host-Level Intrusion Detection Systems
Network-Level Intrusion Detection Systems
Summary
Chapter 7: Anticipating Attacks, or Creating an Intrusion Detection Infrastructure
Training Personnel
Training Centers
On-Line Training
On-Line Seminars
Seminars and Conferences
Business Games
Certification of IS Professionals
Defining Security Policy and Procedures
Selecting and Using System and Network Logging Mechanisms
Generating Information for Consistency Checkers
Backing up Important Files and Directories
Summary
Chapter 8: The Life Cycle, Deployment, and Implementation of an IDS
Life Cycle of the IDS Infrastructure Project
Justifying Your Purchase
Bringing the IDS into Operation
Chapter 9: Selecting an Intrusion Detection System
Preliminary Analysis
Intrusion Detection System Customers
Evaluation Criteria
Testing
Summary
Chapter 10: Placement of the Intrusion Detection System
Placing IDS Sensors
Using IDS Sensors in Switched Networks
Placing the Security Scanner
Placement of Integrity Control Systems
Placing Management Consoles
Factors to Consider when Setting up an Intrusion Detection System
Chapter 11: Using Intrusion Detection Systems
Selecting the Correct Host for an IDS
Purchasing an IDS
Installation and Deployment
Specifying the Rules for Classical IDSs
Specifying the Rules for Security Scanners
Configuration of the Event Logging and Alerting Mechanisms
Strengthening IDS Security
Summary
Chapter 12: Common IDS Problems
General Problems
Network-Level Intrusion Detection Systems
Host-Level Intrusion Detection Systems
Summary
Chapter 13: Standardization in the Field of Intrusion Detection
The Adaptive Network Security Alliance
The Lincoln Laboratory Project
The OSEC Project
The Intrusion Detection Systems Consortium
Open Platform for Secure Enterprise Connectivity
The Common Content Inspection Standard
The Common Intrusion Detection Framework Project
The Intrusion Detection Working Group
The Common Vulnerabilities and Exposures Database
The ICAT Database
The Intrusion Data Library Enterprise Database
DARPA Projects
Chapter 14: Incident Response
Investigation of Unexpected Changes
Documenting all Failed Attempts
Summary
Appendix A: List of Ports Frequently Used by Trojans
Appendix B: List of Most Frequently Scanned Ports
Appendix C: List of Internet Address Ranges
Appendix D: List of First-Level Domains
Appendix E: List of Protocol Identifiers for IPv4
Bibliography
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J, K
Index_L
Index_M
Index_N
Index_O
Index_P, Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X, Y, Z
List of Figures
List of Tables
List of Code Examples
List of Sidebars
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Effect of Inadequate Sampling Rate
Laying Cables in an Uncooled Attic Space
Issues with Screening
IBIS (I/O Buffer Information Specification)
Fully Configured Transmission Line
Software Configuration Management
Configuration Verification and Audit
Metrics and Configuration Management Reference
Appendix T Software Configuration Management Plan (SCMP)
Appendix W Physical Configuration Audit (PCA) Checklist
Appendix Y Supplier CM Market Analysis Questionnaire
Cisco Voice Gateways and Gatekeepers
Troubleshooting Digit Manipulation
Case Study: Implementing Gateway-Controlled RSVP
Verifying and Troubleshooting MGCP Gateway Fallback
Gatekeeper Configuration
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
The AJAX Control Toolkit
Remote Method Calls with ASP.NET AJAX
Building AJAX Applications with ASP.NET
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Triggers
Attacking Oracle PL/SQL Web Applications
Running Operating System Commands
Appendix A Default Usernames and Passwords
User Interfaces in C#: Windows Forms and Custom Controls
Designing with Classes and Tiers
Data Controls
Dynamic User Interface
GDI+ Controls
Help and Application-Embedded Support
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies