|
|
3.4 Intrusion Detection
3.4.1 Network Based
3.4.1.1 Active Detection
3.4.1.2 Passive Detection
3.4.2 Host Based
3.4.2.1 Active Detection
3.4.2.2 Passive Detection
3.4.3 Honey Pots
3.4.4 Incident Response
2.3.3 Instant Messaging
2.3.3.1 Vulnerabilities
2.3.3.2 8.3 Naming Conventions
2.3.3.3 Packet Sniffing
2.3.3.4 Privacy
2.6 Wireless
2.6.1 WTLS
2.6.2 802.11x
2.6.3 WEP/WAP
2.6.4 Vulnerabilities
2.6.4.1 Site Surveys
The purpose of a network, as you know, is to provide a convenient connection path to share data, resources, and services. This very connectivity forms the basis of the problems that we face in providing a secure environment for our systems. This chapter deals with intrusion detection, detection methods, wireless technologies, and instant messaging. Additionally, this chapter introduces the concepts of signal analysis and network monitoring.
|
|