Security in Computing, 5e by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies

Security in Computing, 5e by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies

Author:Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies [Pfleeger, Charles P.]
Language: eng
Format: azw3, mobi
Publisher: Prentice Hall
Published: 2015-01-22T16:00:00+00:00


6.8 Intrusion Detection and Prevention Systems

After the perimeter controls, firewall, and authentication and access controls block certain actions, some users are admitted to use a computing system. Most of these controls are preventive: They block known bad things from happening. Many studies (for example, see [DUR99]) have shown that most computer security incidents are caused by insiders or people impersonating them, people who would not be blocked by a firewall. And insiders require access with significant privileges to do their daily jobs. The vast majority of harm from insiders is not malicious; it is honest people making honest mistakes. Then, too, there are the potential malicious outsiders who have somehow passed the screens of firewalls and access controls. Prevention, although necessary, is not a complete computer security control; detection during an incident copes with harm that cannot be prevented in advance. Larry Halme and Ken Bauer [HAL95] survey the range of controls to deal with intrusions.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Cybersecurity: The Beginner's Guide by Dr. Erdal Ozkaya(1562)
Digital Forensics and Incident Response - Second Edition by Gerard Johansen(1359)
Network Security Strategies by Aditya Mukherjee(1287)
Modern Cryptography for Cybersecurity Professionals by Lisa Bock(1238)
Practical Cybersecurity Architecture by Diana Kelley Ed Moyle(1204)
Web Penetration Testing with Kali Linux - Third Edition by Gilberto Nájera-Gutiérrez(746)
Web Application Obfuscation by Mario Heiderich & Eduardo Alberto Vela Nava & Gareth Heyes & David Lindsay(558)
Cybersecurity - Attack and Defense Strategies by Erdal Ozkaya & Yuri Diogenes(550)
GCIH GIAC Certified Incident Handler All-in-One Exam Guide by Nick Mitropoulos(411)
Cybercrime Investigations by John Bandler(370)
Kali Linux Penetration Testing Bible by Gus Khawaja(364)
Computer Hacking Forensic Investigator Exam Workbook: 500+ Questions & Answers for ECCouncil 312-49: Updated 2020 by Aries+ Centre(325)
The Hardware Hacking Handbook by Colin O'Flynn(324)
Kali Linux: Testing Your Network: How to Test Infrastructure Security with Security Testing and Penetration Testing by Eltrinos Frank(315)
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks by Purackal Rachel Sebastian(285)
Security in Computing, 5e by Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies(282)
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites by Rob Kowalski(279)
8 Steps to Better Security by Crawley Kim;(271)
Security, Privacy and User Interaction by Unknown(259)
Cybersecurity: A Self-Teaching Introduction by C.P. Gupta & K.K. Goyal(248)