Skip to content

Download Cisco Security Professional's Guide to Secure Intrusion by Baumrucker C.T., Burton J.D., Dentler S. PDF

By Baumrucker C.T., Burton J.D., Dentler S.

Cisco structures, Inc. is the global chief in networking for the web, and its Intrusion Detection platforms line of goods is making in roads within the IDS marketplace section, with significant enhancements having occurred in February of 2003.A complete, up to date advisor to the and software program that contain the Cisco IDS. This booklet does greater than convey community engineers the right way to arrange and deal with this line of most sensible promoting items ... it walks them step-by-step via all of the goals of the Cisco safe Intrusion Detection process direction (and corresponding examination) that community engineers needs to go on their solution to attaining sought-after CCSP certification.

Show description

Read or Download Cisco Security Professional's Guide to Secure Intrusion Detection Systems PDF

Similar networking books

Implementing 802.11, 802.16 and 802.20 wireless networks: planning, troubleshooting, and maintenance

This isn't one other ebook approximately fitting a house or pastime wireless process. in its place, this e-book indicates you ways to plot, layout, set up, and function WLAN structures in companies, associations, and public settings resembling libraries and resorts. In different phrases, this e-book is jam-packed with severe details for critical execs liable for imposing powerful, excessive functionality WLANs overlaying parts as small as a espresso store or as huge as whole groups.

Metaheuristic Procedures for Training Neutral Networks

Synthetic neural networks (ANNs) provide a normal framework for representing non-linear mappings from a number of enter variables to a number of output variables, and so they will be regarded as an extension of the various traditional mapping innovations. as well as many issues on their organic foundations and their fairly broad spectrum of purposes, developing acceptable ANNs will be obvious as a truly not easy challenge.

NETWORKING 2011: 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part II

The two-volume set LNCS 6640 and 6641 constitutes the refereed lawsuits of the tenth overseas IFIP TC 6 Networking convention held in Valencia, Spain, in may possibly 2011. The sixty four revised complete papers provided have been conscientiously reviewed and chosen from a complete of 294 submissions. The papers function leading edge study within the parts of purposes and companies, subsequent iteration net, instant and sensor networks, and community technological know-how.

Extra info for Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Sample text

NIDS can be hardware or software-based systems and, depending on the manufacturer of the system, can attach to various network mediums such as Ethernet, FDDI, and others. Oftentimes, NIDS have two network interfaces. One is used for listening to network conversations in promiscuous mode and the other is used for control and reporting. There are other means of supplying traffic to the IDS such as network taps. Cisco uses Switched Port Analyzer (SPAN) functionality to facilitate this capability on their network devices and, in some network equipment, includes NIDS components directly within the switch.

This means the use of documented and policy-directed software and human practices to ensure full awareness of potential security events. Software systems include well-tuned alert thresholds and logging mechanisms on the devices used to secure the network, such as firewalls, IDS, and AAA servers. It is absolutely critical that the reporting mechanisms are properly configured, however. Otherwise, security administrators will be overwhelmed with false-positive data and will be rendered ineffective in actual security situations.

It is at the point of detection that defined and practiced response measures must be implemented. Some responses may be automated, such as automatic shunning or filtering based on an IDS signature detection. Most responses will likely be manual, however. In these situations, administrators should have clear roles and responsibilities to mitigate the effects of an attack and alert upstream authorities, both inside and outside of the organization. Well-developed security policies are often helpful in delineating such roles, responsibilities, and actions.

Download PDF sample

Rated 4.09 of 5 – based on 13 votes