Security in Computing, 5/e
Author:Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies [Pfleeger, Charles P.]
Language: eng
Format: epub
Publisher: Prentice Hall
Published: 2015-01-23T08:00:00+00:00
6.8 Intrusion Detection and Prevention Systems
After the perimeter controls, firewall, and authentication and access controls block certain actions, some users are admitted to use a computing system. Most of these controls are preventive: They block known bad things from happening. Many studies (for example, see [DUR99]) have shown that most computer security incidents are caused by insiders or people impersonating them, people who would not be blocked by a firewall. And insiders require access with significant privileges to do their daily jobs. The vast majority of harm from insiders is not malicious; it is honest people making honest mistakes. Then, too, there are the potential malicious outsiders who have somehow passed the screens of firewalls and access controls. Prevention, although necessary, is not a complete computer security control; detection during an incident copes with harm that cannot be prevented in advance. Larry Halme and Ken Bauer [HAL95] survey the range of controls to deal with intrusions.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(14687)
The Mikado Method by Ola Ellnestam Daniel Brolund(11946)
Hello! Python by Anthony Briggs(11861)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11291)
Dependency Injection in .NET by Mark Seemann(11054)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10525)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9888)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9486)
Grails in Action by Glen Smith Peter Ledbrook(9217)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8847)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8665)
The Kubernetes Operator Framework Book by Michael Dame(8472)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8329)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8292)
Robo-Advisor with Python by Aki Ranin(8246)
Practical Computer Architecture with Python and ARM by Alan Clements(8220)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8190)
Building Low Latency Applications with C++ by Sourav Ghosh(8095)