Preview

system security

Good Essays
Open Document
Open Document
573 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
system security
Three classes of intruders:
• Masquerader: An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account
• Misfeasor: A legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges
• Clandestine user: An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection.

Approaches to intrusion detection:
1. Statistical anomaly detection: Involves the collection of data relating to the behavior of legitimate users over a period of time. Then statistical tests are applied to observed behavior to determine with a high level of confidence whether that behavior is not legitimate user behavior. a. Threshold detection: This approach involves defining thresholds, inde- pendent of user,for the frequency of occurrence of various events. b. Profile based: A profile of the activity of each user is developed and used to detect changes in the behavior of individual accounts.
2. Rule-based detection: Involves an attempt to define a set of rules that can be used to decide that a given behavior is that of an intruder. a. Anomaly detection: Rules are developed to detect deviation from previ- ous usage patterns. b. Penetration identification: An expert system approach that searches for suspicious behavior

Honeypots A relatively recent innovation in intrusion detection technology is the honeypot. Honeypots are decoy systems that are designed to lure a potential attacker away from critical systems.Honeypots are designed to • divert an attacker from accessing critical systems • collect information about the attacker’s activity • encourage the attacker to stay on the system long enough for administrators to respond
These systems are filled with fabricated information designed to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    Honey pot is a closely monitored decoy system. It traces the network attacks. It can distract from more valuable targets and gather forensic evidence from the attackers and their techniques.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    vi. Each user and workforce member must ensure that their assigned User Identification is appropriately protected and only used for legitimate access to networks, systems, or applications. If a user or workforce members believes their user identification has been comprised, they must report that security incident to the appropriate Security Officer…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    AFM 351 Satyam Fraud

    • 815 Words
    • 4 Pages

    These “super-user” login identifications masked the existence of the fake invoices from the leaders of…

    • 815 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services. Retrieved September 22, 2009, from…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    It gives the person access using the sudo access, superuser capability and allows them to run programs with the…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    Typically, an Intrusion Detection System (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns using techniques such as packet sniffing. There would be a lot of alerts because Snort is public domain intrusion detection system which would monitors traffic by examining every packet on a network using a process called packet sniffing. Since Snort is a rule-based IDS, when a packet comes in, its source and destination IP addresses and ports are then compared to the rules in the ruleset. If any of them are applicable to the packet, then the options are compared to the packet. If all of these comparisons return a match, then the specified action is taken…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    (“recognizable” or “valid” or “authorized”) individual, but is far from that. The link is very malicious,…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Nt1330 Unit 3.1 Essay

    • 488 Words
    • 2 Pages

    A honeypot is effectively a trap for potential attackers. Generally it’s a computer isolated from your network that is setup to look like it is part of the network and is designed to appear as though it contains important information. Desirably this’ll draw the attention of attackers. By having a honeypot you can monitor it so you can detect attackers faster and don’t require performance taxing protocols running on all of your systems in your network. Hopefully those wishing to snoop your network will be focused towards your honeypot and then you can monitor the attacker and reduce potential impact from them (Wikipedia - Honeypot, 2015).…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following can be defined as a person who uses his or her expertise to gain access to other people’s computers?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    1. A user made unauthorized use of network resources by attacking network entities. You are potentially sabotaged by an employee or employer.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    • An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009)…

    • 505 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Computer Misuse Act 1990 it is a law that does not allow certain activities when using computers, this include: hacking into other people's systems, misusing software or helping a person to gain access to protected files on someone's else's computer.…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Intrusion detection system/intrusion prevention system (IDS/IPS) | * System/Application domain * Remote access domain * LAN-to-WAN domain | Integrity |…

    • 299 Words
    • 2 Pages
    Satisfactory Essays