Intrusion Detection System(IDS) in Seminar In Info. Sec. Class talk by Mr.Dahliyusmauto on 24/02/2011


what is an IDS?

Any set of actions that attempt to compromise theconfidentiality, integrity, or availability of a computer resource is called as ids.

COMPUTER SECURITY AND ROLES:
-Confidentiality:
Transforming data such that only authorized parties can decode it.

Authentication:
-Proving or disproving someone's or something's claimed identity.

Integrity checking:
-Ensuring that data cannot bemodified without such modification being detectable.

Non repudiation:
-Proving that a source of somedata did in fact send data that he might later deny sending.

TYPES OF VIOLATIONS:
Attack
-Attempts to exploit a vulnerability
-Ex: denial of service, privilege escalation

Intrusion
-Acts as another legitimate user

Misuse

-User abuses privileges
-Often called the "insider threat"

No comments:

Post a Comment