intrusion_10
ICSA, Inc.
For more information, call 888-396-8348 10
An Introduction to Intrusion Detection and Assessment
IDSC members as of March 22, 1999 include:
AXENT Technologies, Inc.
(www.axent.com)
BindView Development Corporation
(www.bindview.com)
Centrax Corporation
(www.centraxcorp.com)
IBM
(www.ers.ibm.com)
Internet Security Systems, Inc.
(www.iss.net)
Memco Software Inc.
(www.abirnet.com)
Network Associates, Inc.
(www.nai.com)
Qwest Communications International, Inc.
(www.qwest.com)
Security Dynamics, Inc.
(www.securitydynamics.com)
Tripwire Security Systems, Inc.
(www.tripwiresecurity.com)
Security infrastructure is the complement of
measures, ranging from policy, procedures, and
practices to technologies and products that repre-
sent an organizations security initiative. The goals
of security counter-measures are to detect problems,
to delay damage and to mitigate the effects of
error and attack. From this perspective, vulner-
ability assessment and intrusion detection are
necessary parts of the security infrastructure but
do not, by themselves, represent a complete security
infrastructure.
About ICSAs Intrusion Detection
Systems Consortium
ICSA formed the Intrusion Detection Systems
Consortium (IDSC) in 1998 to provide product
developers an open forum within which they
could work towards common goals. These goals
include educating end-users, influencing industry
standards, and maintaining product and marketing
integrity.
Members meet on a quarterly basis and participate
in ongoing discussions and cooperative projects
such as this white paper. Membership is open to
any commercial developer of intrusion detection
and vulnerability assessment products and services.
See http://www.icsa.net/services/consortia/intrusion.
IDSC Mission Statement:
The mission of the IDSC is to facilitate the
adoption of intrusion detection products by defining
common terminology, increasing market awareness,
maintaining product integrity and influencing
industry standards.1
1
Source: ICSA