Page 193 - DCAP516_COMPUTER_SECURITY
P. 193

Computer Security




                    Notes          Intrusion Prevention System: It is a network security device that monitors network and/or
                                   system activities for malicious or unwanted behavior and can react, in real-time, to block or
                                   prevent those activities.
                                   Network Intrusion Detection System: It is an independent platform which identifies intrusions
                                   by examining network traffic and monitors multiple hosts.
                                   Network-based IPS: It is one where the IPS application/hardware and any actions taken to
                                   prevent an intrusion on a specific network host(s) is done from a host with another IP address on
                                   the network (This could be on a front-end firewall appliance.)
                                   Protocol-based Intrusion Detection System: It consists of a system or agent that would typically
                                   sit at the front end of a server, monitoring and analyzing the communication protocol between
                                   a connected device (a user/PC or system).

                                   14.9 Review Questions

                                   1.  What are Intruders and their different types?
                                   2.  Explain the need and importance of intrusion prevention system.

                                   3.  Describe the need and importance of intrusion detection system.
                                   4.  What is an E-mail and its architecture?
                                   5.  Discuss the various security aspects relating to e-mail.
                                   6.  Write short notes on the following:
                                       (a)  PGP
                                       (b)  PEM
                                       (c)  E-mail
                                       (d)  E-mail gateways
                                       (e)  RFC 822

                                   Answers: Self Assessment
                                   1.  Rate-based IPS (RBIPS)            2.   protocol analyzer
                                   3.  Host-based IPS (HIPS)             4.   Unified Threat Management (UTM)

                                   5.  Misfeasor                         6.   Clandestine
                                   7.  True                              8.   False
                                   9.  False                             10.  True
                                   11.  True

                                   14.10 Further Readings



                                   Books       Managing Enterprise Information Integrity: Security, Control and Audit Issues, IT
                                               Governance Institute.
                                               Risks of Customer Relationship Management: A Security, Control, and Audit Approach,
                                               PricewaterhouseCoopers Llp.
                                               Security, Audit & Control Features PeopleSoft: A Technical and Risk Management
                                               Reference Guide, 2nd Edition, Deloitte Touche Tohmatsu Research Team, ISACA.
                                               William Stallings, Computer Security: Principles and Practice, Prentice Hall, 2008.


          186                               LOVELY PROFESSIONAL UNIVERSITY
   188   189   190   191   192   193