Weitere Kapitel dieses Buchs durch Wischen aufrufen
The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail. This notion has driven the concept of system security and defined the disciplines of computer and computer network security. Computer network security is made up of three principles: prevention, detection, and response. Although these three are fundamental ingredients of security, most resources have been devoted to detection and prevention because if we are able to detect all security threats and prevent them, then there is no need for response.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Sundaram A. An introduction to intrusion detection , ACM Digital Library. http://dl.acm.org/citation.cfm?id=332161
Kizza JM (2002) Computer network security and cyber ethics. McFarlans Publishers, Jefferson
Halme LR, Bauer KR (1995) AINT misbehaving: a taxonomy of anti-intrusion techniques . Proceedings of the 18th National Information Systems Security conference.
Handley M, Paxson V, Kreibich C. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics . ACM Digital Library. http://dl.acm.org/citation.cfm?id=1267621
Proctor P (2001) The practical intrusion detection handbook. Prentice Hall, Upper Saddle River
Innella P. The evolution of intrusion detection systems . Symantec-Connect. http://www.symantec.com/connect/articles/evolution-intrusion-detection-systems
Mullins M. Lock IT down: implementing an intrusion detection system on your network: how to implement a network intrusion detection system. Tech Republic. http://www.techrepublic.com/article/lock-it-down-implementing-an-intrusion-detection-system-on-your-network/
Internet Security Systems. Network- vs Host-based intrusion detection: a guide to intrusion detection technology .http://www.windowsecurity.com/archived/nvh_ids.html
Panko RR (2004) Corporate computer and network security. Prentice Hall, Upper Saddle River
Yee A (2003) Network intrusions: from detection to prevention. Int J Inform Assur Prof 8(1)
- System Intrusion Detection and Prevention
Joseph Migga Kizza