Create a new account

It's simple, and free.

Intrusion Detection

There will be many more terms used that are unfamiliar to the general reader than the ones listed below. However, these basic terms being defined will assist us in being familiar with the ones that will be used with frequency within the course of this text:

Intrusion: Someone who attempts to break into or misuse a computer system (Intruders are commonly referred to as Hackers or Crackers):

Physical Intrusion: Intruder has physical access to the machine being intruded.

System Intrusion: Intruder is a low-privilege user on the system being intruded.

Remote Intrusion: Intruder attempts to enter system via remote access across the network.

Intrusion Detection System (ISD): A system designed to detect intrusion.

Network Intrusion Detection System (NIDS): Monitoring of packets on the network wire to discover if intrusion is attempted.

System Integrity Verifiers (SIV): Scans files to alert user to intruder changes.

Log File Monitors (LFM): Scans log files generated by network services for patterns that suggest intruder attack.

Outsiders: Intruders from outside the network. May originate intrusion from the Internet, dial-up lines, physical break-ins, or partner network.

Insiders: Intruders who legitimately use the network. 80% of security breaches are committed by insiders.

As society changes, so too do its forms of communicating, doing business, technologies, and its types of criminal activities. We see all four of these aspects of society converge when we discuss the most dramatic change to impact society perhaps in all of history – computer technology and the Internet and World Wide Web (WWW). As technology that allows instant communication around the globe 24/7 emerges, the number of businesses interacting in commerce with each other and with consumers via the Internet and WWW continues to increase. The pervasive spread of the Internet and increasing access to it has raised many questions about reg...

Page 1 of 19 Next >

More on Intrusion Detection...

Loading...
APA     MLA     Chicago
Intrusion Detection. (1969, December 31). In LotsofEssays.com. Retrieved 23:37, April 26, 2024, from https://www.lotsofessays.com/viewpaper/1685721.html