• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Risk Management — Visual Ids Countermeasures

Risk Management — Visual Ids Countermeasures






Total Views
Views on SlideShare
Embed Views



1 Embed 1

http://www.slideshare.net 1


Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    Risk Management — Visual Ids Countermeasures Risk Management — Visual Ids Countermeasures Presentation Transcript

    • Risk management — visual IDS countermeasures H. Read, A. Blyth. BT Technology Journal. London: Jan 2007. Vol. 25, Iss. 1; p. 201 (7 pages)
    • Ecommerce Risk Management
      • CM – Countermeasure
      • IDS – Intrusion Detection Systems
      • Main need for IDS – to combat intrusions into sensitive company information.
        • This could lead to tangible losses of revenue and reputation.
        • Also – to safeguard consumer information
    • Problem?
      • Too much information. Information overload.
      • Once linked – the site sends data but also receives data.
        • Strategy – when an on-line company receives “unusual” data (contains malicious code) – there needs to be a contingency plan to minimize damage.
          • Need preventive and detective measures
      • IDS – used to log and characterize events for future examination and lessons learned.
        • This leads to incompatible data
        • Too much data is sifted and stored
    • Solution
      • Visualization
        • Use of interoperable visualization tools cuts down on the amount of information gathered when trying to combat unauthorized users (hackers, disgruntled employees, industrial espionage).
        • This makes the identification process easier
    • Visualization tools: What do they do?
      • These tools adhere to a framework that allows interoperability and independence for any type of database.
      • Graphing can show trends and show anomalies
      • Effective visualization tools should reduce the quantity of false positive events
    • IDS DATA
      • Geographical data – physical location of attack (can be found by IP address)
      • Logical Data – IP addresses, DNS names, MAC addresses, host names. This is where the attack virtually took place.
      • Temporal Data – Date and time of attack
    • Page 205, Risk Management
    • Time range elaborated
      • Real time – displays attack info as it occurs
      • Analytical – groups attacks per event (such as denial of service attack)
      • Informational – attacks when discovered, “show rich full pictures”
    • Summary
      • Importance of interoperability
      • Visualization makes for easy identification of an attack
      • Visualization helps to combat future attacks
      • Importance of real-time and adequate detail
    • What does this mean to the consumer and ecommerce?
      • Ecommerce is the wave of NOW. The future is now. One day all commerce may be done virtually.
      • Adequate safeguards protect the customer as well as the vendor
      • Uniformity and adherence to standards are critical to upholding ecommerce continuity
    • Questions
      • Why do these in-depth methods need to adhere to a standard?
      • Do these countermeasures make you, the consumer, feel safer?
      • Will you fee comfortable in the future using ecommerce exclusively?
      • Do you care about this now? Or do you feel safe with “trusted sites.”