intrusion_5
ICSA, Inc.
For more information, call 888-396-8348 5
An Introduction to Intrusion Detection and Assessment
INTRODUCTION
9
Definitions
9
About ICSAs Intrusion Detection Systems Consortium
10
About This White Paper Series
11
INTRUSION DETECTION OVERVIEW
11
What Is Intrusion Detection?
11
Vulnerability Assessment and Intrusion Detection
12
Products Can Be Successfully Deployed in Operational Environments
12
Table of Technology Features
13
WHERE INTRUSION DETECTION SYSTEMS, FILE INTEGRITY AND
VULNERABILITY ASSESSMENT PRODUCTS FIT IN NETWORK SECURITY
MANAGEMENT
14
Network Security Management
14
The Security Hierarchy
14
Why Firewalls arent enough
14
Who Guards the Guard? Trust and Intrusion Detection
15
System Security Management a Process View
15
DEBUNKING MARKETING HYPE WHAT INTRUSION DETECTION
SYSTEMS AND RELATED TECHNOLOGIES CAN AND CANNOT DO
16
Realistic benefits
16
- They can lend a greater degree of integrity to the rest of your security infrastructure.
16
- They can make sense of often obtuse system information sources, telling you whats really
happening on your systems.
17
- They can trace user activity from the point of entry to point of exit or impact
17
- They can recognize and report alterations to data files
17
Table of Contents