Cybercrime

Only available on StudyMode
  • Download(s) : 111
  • Published : April 18, 2013
Open Document
Text Preview
Research Paper: Information Security
Technologies
by
Benjamin Tomhave
November 10, 2004
Prepared for:
Professor Dave Carothers
EMSE 218
The George Washington University
This paper or presentation is my own work. Any assistance I received in its preparation is acknowledged within the paper or presentation, in accordance with academic practice. If I used data, ideas, words, diagrams, pictures, or other information from any source, I have cited the sources fully and completely in footnotes and bibliography entries. This includes sources which I have quoted or paraphrased. Furthermore, I certify that this paper or presentation was prepared by me specifically for this class and has not been submitted, in whole or in part, to any other class in this University or elsewhere, or used for any purpose other than satisfying the requirements of this class, except that I am allowed to submit the paper or presentation to a professional publication, peer reviewed journal, or professional conference. In adding my name following the word 'Signature', I intend that this certification will have the same authority and authenticity as a document executed with my hand-written signature.

Signature _____Benjamin L. Tomhave________________________
Benjamin L. Tomhave 12/7/2004 1Research Paper: Information Security Technologies
by
Benjamin L. Tomhave
Abstract
The following research paper provides analysis of thirteen (13) information security technology topics, arranged in ten (10) groups, that are either commonly found or emerging within the information security industry. These topics include: Access Control Management, Antivirus, Audit Data Reduction, Firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Anomaly Detection Systems (ADS), Event Correlation Systems (ECS), Network Mapping, Password Cracking, Public Key Infrastructure, Virtual Private Network, and Vulnerability Scanning Systems. IDS, IPS, ADS and ECS are grouped together under one common heading (Intrusion Detection and Analysis Systems) due to their commonality and interdependence. This paper provides basic overview information about each technology, but primarily focuses on analyzing each technology within the modern information security and business context, looking at how it meets business needs while addressing Confidentiality, Integrity and Availability as a Countermeasure that Detects, Corrects and/or Protects.

Benjamin L. Tomhave 12/7/2004 2Table of Contents
I.INTRODUCTION AND OVERVIEW OF APPROACH.................................................4 II.ACCESS CONTROL MANAGEMENT.........................................................................5 A.Business Analysis.........................................................................................................5 B.Security Analysis..........................................................................................................7 III.ANTIVIRUS................................................................................................................... 9 A.Business Analysis.......................................................................................................11 B.Security Analysis........................................................................................................11 IV.AUDIT DATA REDUCTION......................................................................................13 A.Business Analysis.......................................................................................................13 B.Security Analysis........................................................................................................14 V.FIREWALLS ............................................................................................................. 15 A.Business Analysis.......................................................................................................17 B.Security...
tracking img