Intrusion Detection System(IDS) in Seminar In Info. Sec. Class talk by Mr.Dahliyusmauto on 24/02/2011


what is an IDS?

Any set of actions that attempt to compromise theconfidentiality, integrity, or availability of a computer resource is called as ids.

COMPUTER SECURITY AND ROLES:
-Confidentiality:
Transforming data such that only authorized parties can decode it.

Authentication:
-Proving or disproving someone's or something's claimed identity.

Integrity checking:
-Ensuring that data cannot bemodified without such modification being detectable.

Non repudiation:
-Proving that a source of somedata did in fact send data that he might later deny sending.

TYPES OF VIOLATIONS:
Attack
-Attempts to exploit a vulnerability
-Ex: denial of service, privilege escalation

Intrusion
-Acts as another legitimate user

Misuse

-User abuses privileges
-Often called the "insider threat"

Intrusion Detection together with critical nodes detection for securing MANET Talk by Mr. Satria Mandala in Seminar In Info. Sec. Class on 17/02/2011

He talk about many things and the most intersting point was about MANET .

The term MANET (Mobile Adhoc Network)refers to a multihop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time , without using any kind of fixed wired infrastructure. MNET are actually self organizing and adaptive networks that can be formed and deformed on-the-fly without the need of any centralized administration.

As for other packet data networks, one –to-one communication in a MANET is achieved by unicast routing each single packet. Routing in MANET is challenging due to the constraints existing on the transmission bandwidth battery power and CPU time and the requirement to cope with the frequent topological changes resulting from the mobility of the nodes. Nodes of a MANET cooperate in the task of routing packets to destination nodes since each node of the network is able to communicate only with those nodes located within its transmission radius R, while the source and destination nodes can be located at a distance much higher than R.

A Talk by Mr. Khalid in Seminar In Info. Sec. on 10/02/2011

The most intersting thing in that class when Mr.Khalid talked about VBN. SO what VBN means?!
VBN Networks is a private network that uses a public network (usually uses a public network (usuallythe Internet) to connect remotethe Internet) to connect remotesites or users togethersites or users together.VPN Solutions are Allowing cost effective expansion of private and secure networks .
Advantage of VPN
-More flexibility

-Geographical flexibility

-Secure and low-cost way to link

-Flexible working hours

-Increased productivity

-Lower costs
-Eliminating the need for long-distance leased lines

-Reducing the long-distance telephone charges

-Reduced equipment costs (modem banks, CSU/DSUs)

-Reduced technical training and support