Your SlideShare is downloading. ×
0
Accounting
Accounting
Accounting
Accounting
Accounting
Accounting
Accounting
Accounting
Accounting
Accounting
Accounting
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Accounting

130

Published on

Published in: Education, Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
130
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Accountability 1
  • 2. ContentAuditing- review of audit info- protect logAccess Control Practice- unauthorized disclosure of infoAccess Control Monitoring- IDS- IPS 2
  • 3. Auditing- able to track- detect intrusions- reconstruct even and systemcondition- legal recourse material- problem report 3
  • 4. Audit- store audits securely- keep log size under control- protect log- right people to review data- only admin can delete log- contain activity of high privilege account 4
  • 5. Access Control PracticeDeny access to system by anonymous userLimit,monitor admin/power userRemove obsolete accountDisable unused serviceLimit, monitor access ruleAudit system periodically...... 5
  • 6. Unauthorizeddisclosure of infoObject reuseEmanation securityTempestWhite noiseControl zone 6
  • 7. IDSNIDS - HIDSSignature based: pattern matching,stateful matchingAnomaly based:Statistical, Protocol,TrafficRule based 7
  • 8. IDS typeKnowledge/signature-basedState-basedStatistical anomaly-basedProtocol anomaly-basedTraffic anomaly-basedRule-based 8
  • 9. IDS sensor, IPS, HoneypotAnalysis engine, Filter received data& detect suspicious activityPrevent, intercept in network trafficSacrificial lamb 9
  • 10. ThreatDictionary attackBrute force attackSpoofing at logonPhishingIdentity theft 10
  • 11. Thank you! 11

×