merkow ppt 12-JRM

merkow ppt 12-JRM merkow ppt 12-JRM

sites.csn.edu
from sites.csn.edu More from this publisher
26.10.2012 Views

Intrusion Detection Systems (IDS) cont. � False Positives, False Negatives, and Subversion Attacks � A false positive occurs when the system classifies an action as anomalous when it is legitimate � A false negative occurs when an intrusive action has occurred but the system allows it to pass as nonintrusive behavior � A subversion error occurs when an intruder modifies the operation of the intrusion detector to force false negatives to occur © Pearson Education Information Security: Principles and Practices 34

Virtual Private Networks (VPNs) � VPN is a network technology that makes it possible to establish private “tunnels” over the public Internet � IP security (IPSec) operates at both the Network Layer and Session Layer of the TCP/IP protocol stack � IPSec VPNs are the most common form in use today and are widely available from network and firewall providers © Pearson Education Information Security: Principles and Practices 35

Virtual Private Networks (VPNs)<br />

� VPN is a network technology that makes it<br />

possible to establish private “tunnels” over<br />

the public Internet<br />

� IP security (IPSec) operates at both the<br />

Network Layer and Session Layer of the<br />

TCP/IP protocol stack<br />

� IPSec VPNs are the most common form in<br />

use today and are widely available from<br />

network and firewall providers<br />

© Pearson Education Information Security:<br />

Principles and Practices 35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!