{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

chapter07 - Learning Objectives Upon completion of this...

Info icon This preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Principles of Information Security, 3rd edition 2 Learning Objectives Upon completion of this material, you should be able to: Identify and describe the categories and operating models of intrusion detection systems Identify and describe honey pots, honey nets, and padded cell systems List and define the major categories of scanning and analysis tools, and describe the specific tools used within each of these categories Explain the various methods of access control, including the use of biometric access mechanisms
Image of page 2
Class Schedule Administration Article Discussion Lecture Chapter 7 Exam 03 Overview Homework Principles of Information Security, 3rd edition 3
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Introduction Protection of organizations IS assets requires a sound enterprise information security program consisting of several key components: People Technical Controls & Solutions (i.e., Firewalls, VPNs, Gateways, DMZ, Encryption, IDPS, etc) Governance ( ESP, Standards, & Procedures) BCP DRP Security Awareness Incident Planning (Detection , Response, & Recovery) Security Assessments & Risk Management Principles of Information Security, 3rd edition 4
Image of page 4
Principles of Information Security, 3rd edition 5 Introduction (continued) Intrusion : type of attack on information assets in which instigator attempts to gain entry into or disrupt system with harmful intent Incident Response : identification of, classification of, response to, and recovery from an incident Intrusion Prevention : consists of activities that seek to deter an intrusion from occurring
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon