Preliminary Analysis Of Intruder Detection System In UUM
There is a rapidly increasing dependence on services provided by these computer systems and networks but most computerized information systems we use in our everyday lives provide very little protection against hostile manipulation. This preliminary study presents report focused on the fundamental...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English English |
Published: |
2002
|
Subjects: | |
Online Access: | http://etd.uum.edu.my/525/1/IBRAHIM_YUSOF.pdf http://etd.uum.edu.my/525/2/IBRAHIM_YUSOF.pdf http://etd.uum.edu.my/525/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | There is a rapidly increasing dependence on services provided by these computer systems and networks but most computerized information systems we use in our everyday lives provide very little protection against hostile
manipulation. This preliminary study presents report focused on the fundamental technical issues of computer intrusion and their taxonomy. The objective of this study is to analyze and understand the nature of intrusion activity and perception of the user regarding the security policy and the implementation of intrusion detection system in the organization. The analysis is based mainly on the data from questionnaires given to the staff in the organization. Throughout this work, systematic categorization of data that related to intrusion has been used as the main method for data analysis. The main categorization of intrusion includes the intruder, their
objective, tools used, access method and result of intrusion. The results of this work include the taxonomy of the intrusion and new findings about the behavior of so-called insider attackers; a dangerous but sometimes neglected security threat. It also explores the perception of the user regarding security implementations and requirement of intrusion detection system in the organization. |
---|