This is a Demo Server. Data inside this system is only for test purpose.
 

Comparison of recovery requirements with investigation requirements for intrusion management systems

Loading...
Publication Logo

Date

2002

Journal Title

Journal ISSN

Volume Title

Publisher

Izmir Institute of Technology

Open Access Color

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No

Research Projects

Journal Issue

Abstract

Computer systems resources and all data contained in the system may need to be protected against the increasing number of unauthorized access, manipulation and malicious intrusions. This thesis is concerned with intrusion management systems and specially with their investigation and recovery subsystems. The goals of these systems are to investigate intrusion attempts and recover from intrusions as fast as possible. In order to achieve these goals me should observe the fact that some of the intrusion attempts will be eventually successful should be accepted and necessary precautions should be taken.After an intrusion has taken place, the focus should be on the assessment:looking at what damage has occurred, how it happened, what changes can be made to prevent such attacks in the future. In this thesis, requirements of investigation and recovery process are determined and related guidelines developed. The similarities and differences between these guidelines are explained.

Description

Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2002
Includes bibliographical references (leaves: 52-54)
Text in English; Abstract: Turkish and English
ix, 54 leaves

Keywords

Intrusion management systems, TK5105.59 A77 2002, Computer Engineering and Computer Science and Control, Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol

Fields of Science

Citation

WoS Q

Scopus Q

Source

Volume

Issue

Start Page

End Page

Collections

Google Scholar Logo
Google Scholar™

Sustainable Development Goals