This is a Demo Server. Data inside this system is only for test purpose.
 

Comparison of recovery requirements with investigation requirements for intrusion management systems

dc.contributor.advisor Tuğlular, Tuğkan en
dc.contributor.author Arpaçay Tapucu, Dilek
dc.date.accessioned 2023-11-13T09:57:31Z
dc.date.available 2023-11-13T09:57:31Z
dc.date.issued 2002 en
dc.description Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2002 en
dc.description Includes bibliographical references (leaves: 52-54) en
dc.description Text in English; Abstract: Turkish and English en
dc.description ix, 54 leaves en
dc.description.abstract Computer systems resources and all data contained in the system may need to be protected against the increasing number of unauthorized access, manipulation and malicious intrusions. This thesis is concerned with intrusion management systems and specially with their investigation and recovery subsystems. The goals of these systems are to investigate intrusion attempts and recover from intrusions as fast as possible. In order to achieve these goals me should observe the fact that some of the intrusion attempts will be eventually successful should be accepted and necessary precautions should be taken.After an intrusion has taken place, the focus should be on the assessment:looking at what damage has occurred, how it happened, what changes can be made to prevent such attacks in the future. In this thesis, requirements of investigation and recovery process are determined and related guidelines developed. The similarities and differences between these guidelines are explained. en
dc.identifier.uri http://standard-demo.gcris.com/handle/123456789/5892
dc.language.iso en en_US
dc.publisher Izmir Institute of Technology en
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject.lcc TK5105.59 A77 2002 en
dc.subject.lcsh Computer networks--Security measures en
dc.subject.lcsh Computer security en
dc.title Comparison of recovery requirements with investigation requirements for intrusion management systems en_US
dc.type Master Thesis en_US
dspace.entity.type Publication
gdc.author.institutional Arpaçay Tapucu, Dilek
gdc.description.department Computer Engineering en_US
gdc.description.publicationcategory Tez en_US
gdc.oaire.accepatencedate 2002-01-01
gdc.oaire.diamondjournal false
gdc.oaire.impulse 0
gdc.oaire.influence 2.9837197E-9
gdc.oaire.influencealt 0
gdc.oaire.isgreen true
gdc.oaire.keywords Intrusion management systems
gdc.oaire.keywords TK5105.59 A77 2002
gdc.oaire.keywords Computer Engineering and Computer Science and Control
gdc.oaire.keywords Bilgisayar Mühendisliği Bilimleri-Bilgisayar ve Kontrol
gdc.oaire.popularity 3.4893627E-10
gdc.oaire.popularityalt 0.0
gdc.oaire.publicfunded false
relation.isAuthorOfPublication 16066bf2-f189-4d4b-91e8-3fc6cb495163
relation.isAuthorOfPublication.latestForDiscovery 16066bf2-f189-4d4b-91e8-3fc6cb495163

Files

Collections