Intrusion Prevention Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

HIDS (host-based intrusion detection systems)

hierarchical management model

HIPS (host-based intrusion prevention systems) 2nd

    benefits of

         acceptable use policy enforcement

         attack prevention

         internal attack propagation prevention

         patch relief

         policy enforcement

     endpoint agents

         access control process

     limitations of, acceptable use policy enforcement

     management infrastructure

         management center

         management interface

     required capabilities

     role in layered defense

    security policies

         anomaly-based

         atomic-rule based

         behavioral

home office IPS deployment

     HIPS implementation

     limiting factors

     NIPS implementation

     security policy goals

Host IPS

     deploying

     role in layered defense

     signature tuning

host-based signatures

     atomic

     stateful

     triggering mechanisms

host-level attack mitigation

     antivirus

     HIDS

     personal firewalls

hosts, classifying

hubs

hybrid IPS/IDS systems 2nd

Категории