Protect Your Information with Intrusion Detection (Power)


The Information System (IS) of any company (financial, insurance, trade, etc.) or organization comprises the components intended to solve specific problems. In most cases, a typical IS comprising two or more hosts includes the following four levels (Fig. 1.2):

Fig. 1.2. Levels of the Information System (IS)

Intruders have the widest range of capabilities at their disposal to violate the security policy at each of the above-listed levels of the IS. For example, to get unauthorized access to financial information stored in one of the MS SQL Server databases, the intruder may try to implement one of the following attacks:


Категории