Flylib.com
Protect Your Information with Intrusion Detection (Power)
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
Table of Contents
BackCover
Protect Your Information with Intrusion Detection
Introduction
Content Overview
Chapter 1: Introduction to Intrusion Detection
Information System Levels
Traditional Security Tools
Summary
Chapter 2: Anatomy of an Attack
Security Events
Vulnerabilities
Attacks
Incidents
Intruders
Summary
Chapter 3: Introduction to Intrusion Detection
Backing up Firewalls
Controlling File Access
Controlling Unreliable Employees and Preventing Information Leaks
Protection against Viruses
Controlling the Administrator s Activities
Controlling Internet Access
Detecting Unknown Devices
Analyzing the Efficiency of Firewall Settings
Analyzing Information Flows
Analyzing Data from Network Equipment
Collecting Proof and Handling Incidents
Performing Inventory and Creating a Network Map
Detecting Default Configurations
Controlling the Efficiency of the IT Department
Intrusion Detection Systems and Other Security Tools
Summary
Chapter 4: The Three Basic Principles of Intrusion Detection
Attack Indications
Sources of Information on Attacks
Summary
Chapter 5: Detecting Attack Traces
Control of File and Folder Integrity
Selecting Data on Important Files and Folders
Integrity Control for Files and Folders
Analysis of Log Files
Network Traffic Analysis
Notification Analysis
Analysis of Processes, Services, and Ports
Detecting Unauthorized Devices
Analysis of External Sources of Information and System Behavior
Summary
Chapter 6: Classification of Intrusion Detection Systems
Security Assessment Systems
Systems Searching for Design Vulnerabilities
Systems for Searching for Configuration Vulnerabilities
Classical Intrusion Detection Systems and Log-File Checkers
Introduction to Classification
Architecture of the Intrusion Detection System
Host-Level Intrusion Detection Systems
Network-Level Intrusion Detection Systems
Summary
Chapter 7: Anticipating Attacks, or Creating an Intrusion Detection Infrastructure
Training Personnel
Training Centers
On-Line Training
On-Line Seminars
Seminars and Conferences
Business Games
Certification of IS Professionals
Defining Security Policy and Procedures
Selecting and Using System and Network Logging Mechanisms
Generating Information for Consistency Checkers
Backing up Important Files and Directories
Summary
Chapter 8: The Life Cycle, Deployment, and Implementation of an IDS
Life Cycle of the IDS Infrastructure Project
Justifying Your Purchase
Bringing the IDS into Operation
Chapter 9: Selecting an Intrusion Detection System
Preliminary Analysis
Intrusion Detection System Customers
Evaluation Criteria
Testing
Summary
Chapter 10: Placement of the Intrusion Detection System
Placing IDS Sensors
Using IDS Sensors in Switched Networks
Placing the Security Scanner
Placement of Integrity Control Systems
Placing Management Consoles
Factors to Consider when Setting up an Intrusion Detection System
Chapter 11: Using Intrusion Detection Systems
Selecting the Correct Host for an IDS
Purchasing an IDS
Installation and Deployment
Specifying the Rules for Classical IDSs
Specifying the Rules for Security Scanners
Configuration of the Event Logging and Alerting Mechanisms
Strengthening IDS Security
Summary
Chapter 12: Common IDS Problems
General Problems
Network-Level Intrusion Detection Systems
Host-Level Intrusion Detection Systems
Summary
Chapter 13: Standardization in the Field of Intrusion Detection
The Adaptive Network Security Alliance
The Lincoln Laboratory Project
The OSEC Project
The Intrusion Detection Systems Consortium
Open Platform for Secure Enterprise Connectivity
The Common Content Inspection Standard
The Common Intrusion Detection Framework Project
The Intrusion Detection Working Group
The Common Vulnerabilities and Exposures Database
The ICAT Database
The Intrusion Data Library Enterprise Database
DARPA Projects
Chapter 14: Incident Response
Investigation of Unexpected Changes
Documenting all Failed Attempts
Summary
Appendix A: List of Ports Frequently Used by Trojans
Appendix B: List of Most Frequently Scanned Ports
Appendix C: List of Internet Address Ranges
Appendix D: List of First-Level Domains
Appendix E: List of Protocol Identifiers for IPv4
Bibliography
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J, K
Index_L
Index_M
Index_N
Index_O
Index_P, Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X, Y, Z
List of Figures
List of Tables
List of Code Examples
List of Sidebars
Protect Your Information with Intrusion Detection (Power)
ISBN: 1931769117
EAN: 2147483647
Year: 2001
Pages: 152
Authors:
A. Lukatsky
,
Alex Lukatsky
BUY ON AMAZON
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 2 Diagnosing and Troubleshooting
Domain 3 Preventive Maintenance
Domain 5 Printers
Domain 4 Networks
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Cryptography
Security Architecture and Design
Business Continuity Planning and Disaster Recovery Planning
Initiation of the System Authorization Process
FileMaker Pro 8: The Missing Manual
Creating Related Records
Comments
Plug-ins
Finding Records
The Database Design Report
An Introduction to Design Patterns in C++ with Qt 4
Optional Arguments
Different Kinds of Arrays
Reusing id3lib
Mp3PlayerView
Section C.2. Understanding the Linker
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #3: Work Together for Maximum Gain
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
MPLS Configuration on Cisco IOS Software
VPN Categories
MPLS Traffic Engineering
Implementing MPLS QoS for Layer 2 VPN Implementations
Case Study 7: Implementing Hub and Spoke Topologies with OSPF
Case Study 8: Implementing Hub and Spoke Topologies with EIGRP
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies