語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security: The nature and...
~
Farmer, Jackie G.
FindBook
Google Book
Amazon
博客來
Information security: The nature and structure of intrusion detection systems.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information security: The nature and structure of intrusion detection systems./
作者:
Farmer, Jackie G.
面頁冊數:
100 p.
附註:
Source: Dissertation Abstracts International, Volume: 67-10, Section: B, page: 5842.
Contained By:
Dissertation Abstracts International67-10B.
標題:
Engineering, System Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3236710
ISBN:
9780542909054
Information security: The nature and structure of intrusion detection systems.
Farmer, Jackie G.
Information security: The nature and structure of intrusion detection systems.
- 100 p.
Source: Dissertation Abstracts International, Volume: 67-10, Section: B, page: 5842.
Thesis (Ph.D.)--Walden University, 2006.
The problem that was explored in this study is the lack of academic research in a critical Intrusion Detection System (IDS) area; i.e., an automated security schema deployed in an effort to reduce information security breaches of a network. Security breaches can cause a mission critical IT system to be unavailable to end users, can provide aid and comfort to an enemy force, and can cause a unit mission to fail.
ISBN: 9780542909054Subjects--Topical Terms:
1018128
Engineering, System Science.
Information security: The nature and structure of intrusion detection systems.
LDR
:03289nmm 2200325 4500
001
1834825
005
20071127121429.5
008
130610s2006 eng d
020
$a
9780542909054
035
$a
(UMI)AAI3236710
035
$a
AAI3236710
040
$a
UMI
$c
UMI
100
1
$a
Farmer, Jackie G.
$3
1923462
245
1 0
$a
Information security: The nature and structure of intrusion detection systems.
300
$a
100 p.
500
$a
Source: Dissertation Abstracts International, Volume: 67-10, Section: B, page: 5842.
500
$a
Adviser: Louis Taylor.
502
$a
Thesis (Ph.D.)--Walden University, 2006.
520
$a
The problem that was explored in this study is the lack of academic research in a critical Intrusion Detection System (IDS) area; i.e., an automated security schema deployed in an effort to reduce information security breaches of a network. Security breaches can cause a mission critical IT system to be unavailable to end users, can provide aid and comfort to an enemy force, and can cause a unit mission to fail.
520
$a
The purpose of this study was to determine how current IDS technology assists in reducing threats to the integrity, confidentiality, and availability of Command Sustainment Support Systems (BCS3). Based on Bell-Lapadula and the Biba theories, a case study of the BCS3 was conducted at three military installations. Security-engineer professionals involved with certifying and accrediting Department of Defense networks were surveyed. The research questions focused on the different IDS approaches being used and the types of computer attacks being detected.
520
$a
The results of the study showed that all of the installations were using IDS as a common practice. Two primary IDS approaches used were network-based and host-based with the strengths of one approach complementing the weaknesses of the other. Besides identifying computer attacks and suspicious activity, data from IDS were also used to identify security weaknesses and vulnerabilities throughout the networks. The three major computer attacks commonly detected by IDS were system scanning, Denial of Service (DoS), and system penetration.
520
$a
Based on these findings, it is recommended that IDS strategies be implemented into the design of an organization's network. This reflects a defense-in-depth or layered approach to protecting an organization's assets by defining and enforcing an effective security policy, installing one or more firewalls to limit access, and deploying access-control measures, and user authentication mechanisms. Finally, continued evaluation and study is recommended to probe further IDS security and functionality.
520
$a
The social change importance for this research is reinforcement of the benefits of using IDS as an element in a defense-in-depth for network security. Further development of IDS may provide network administrators with the insights to protect systems in a wide range of critical applications in an ever-increasing threat environment.
590
$a
School code: 0543.
650
4
$a
Engineering, System Science.
$3
1018128
650
4
$a
Computer Science.
$3
626642
690
$a
0790
690
$a
0984
710
2 0
$a
Walden University.
$3
718925
773
0
$t
Dissertation Abstracts International
$g
67-10B.
790
1 0
$a
Taylor, Louis,
$e
advisor
790
$a
0543
791
$a
Ph.D.
792
$a
2006
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3236710
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9225845
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入