HostedDB - Dedicated UNIX Servers

intrusion_5 ICSA, Inc. For more information, call 888-396-8348                 5 An Introduction to Intrusion Detection and Assessment INTRODUCTION 9 • Definitions 9 • About ICSA’s Intrusion Detection Systems Consortium 10 • About This White Paper Series 11 INTRUSION DETECTION OVERVIEW 11 • What Is Intrusion Detection? 11 • Vulnerability Assessment and Intrusion Detection 12 • Products Can Be Successfully Deployed in Operational Environments 12 • Table of Technology Features 13 WHERE INTRUSION DETECTION SYSTEMS, FILE INTEGRITY AND VULNERABILITY ASSESSMENT PRODUCTS FIT IN NETWORK SECURITY MANAGEMENT 14 • Network Security Management 14 • The Security Hierarchy 14 • Why Firewalls aren’t enough 14 • Who Guards the Guard?  – Trust and Intrusion Detection 15 • System Security Management – a Process View 15 DEBUNKING MARKETING HYPE – WHAT INTRUSION DETECTION SYSTEMS AND RELATED TECHNOLOGIES CAN AND CANNOT DO 16 • Realistic benefits 16 -  They can lend a greater degree of integrity to the rest of your security infrastructure. 16 -  They can make sense of often obtuse system information sources, telling you what’s really happening on your systems. 17 -  They can trace user activity from the point of entry to point of exit or impact 17 -  They can recognize and report alterations to data files 17 Table of Contents