chapter07 - Learning Objectives Upon completion of this...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd edition 2 Learning Objectives Upon completion of this material, you should be able to: Identify and describe the categories and operating models of intrusion detection systems Identify and describe honey pots, honey nets, and padded cell systems List and define the major categories of scanning and analysis tools, and describe the specific tools used within each of these categories Explain the various methods of access control, including the use of biometric access mechanisms
Background image of page 2
Class Schedule Administration Article Discussion Lecture Chapter 7 Exam 03 Overview Homework Principles of Information Security, 3rd edition 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introduction Protection of organizations IS assets requires a sound enterprise information security program consisting of several key components: People Technical Controls & Solutions (i.e., Firewalls, VPNs, Gateways, DMZ, Encryption, IDPS, etc) BCP DRP Security Awareness Principles of Information Security, 3rd edition 4
Background image of page 4
Principles of Information Security, 3rd edition 5 Introduction (continued) Intrusion : type of attack on information assets in which instigator attempts to gain entry into or disrupt system with harmful intent Incident Response : identification of, classification of, response to, and recovery from an incident Intrusion Prevention : consists of activities that seek to deter an intrusion from occurring
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd edition 6 Introduction (continued) Intrusion Detection : consists of procedures and systems created and operated to detect system intrusions Intrusion Reaction : encompasses actions an organization undertakes when intrusion event is detected Intrusion Correction Activities : finalize restoration of operations to a normal state
Background image of page 6
Principles of Information Security, 3rd edition 7 Anti-Intrusion Technologies IDS : A device that is used to detect unauthorized activities within the internal network or individual systems. IPS : A device that works to prevent unauthorized network access IDPS : Devices that are a combination of IDS and IPS. Detect a violation of its configuration, activate alarm, and prevent the intrusion from propagating or executing a successful attack. Many IDPSs enable administrators to configure systems to notify them directly of trouble via e-mail or pagers IDPS can also be configured to notify an external security service organization of a break-in
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Principles of Information Security, 3rd edition 8 IDPS Terminology Alert or alarm : An indication that a system has just been attacked and/or continues to be under attack. False attack stimulus
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/15/2012 for the course CIS CIS120 taught by Professor Zales during the Spring '12 term at Harrisburg Area Community College.

Page1 / 58

chapter07 - Learning Objectives Upon completion of this...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online