Expanding Topological Vulnerability Analysis To Intrusion Detection Through The Incident Response Intelligence System

Read Complete Research Material



Expanding Topological Vulnerability Analysis to Intrusion Detection through the Incident Response Intelligence System

By

CHAPTER 1: INTRODUCTION

In computer security, the word vulnerability refers to a weakness in a system allowing an attacker to violate the confidentiality, integrity, availability, access control and consistency of the system or its data and applications. The vulnerabilities result from bugs or design flaws in the system. Although in a broader sense, can also be the result of technological limitations, because, in principle, there is 100% secure system. There are real vulnerabilities and theoretical vulnerabilities known as exploits (Tian, 2008, 1599).

Solving the complex and volatile task of information security, this is easy to get bogged down in details and lose sight of the real problems. Therefore, from time to time it helps to look at any current problem from the standpoint of the three pillars of information security: confidentiality, integrity and availability. Each requirement in a situation ultimately comes down to one of these foundations, and any danger that faced a threat to one of them. This verification framework allows not deviating from the target and not missing the crucial details. Every detail is important because the reliability of protection is determined by its weakest link. This article examines the role of confidentiality, integrity and fault tolerance in a typical Windows-based network of small and medium enterprises (Mathew, 2005, 1801).

Today, every now and again we hear about the confidentiality of data a user or customer. The problem of protecting personal data cannot be ignored but is not limited to the privacy. The requirement of confidentiality is to prevent unauthorized person to read the information without the permission of its owner. Now, in a period of rapid growth in the number of "zombie" systems, robots and worms, it is important to remember that confidential information must be protected not only from intruders but also on their "agents" that can be harmful program, the vulnerable computer or other network component.

Protect servers are not too difficult. They can simply be locked up in a room accessible only insufficient support staff. The question is how to guarantee the physical security of workstations, especially laptops? The only way to protect sensitive data on the desktop is resorting to encryption. Online, there are many encryption programs, including file and storage levels (Papadaki, 2006, 235).

Aims and Objectives

This research study aims to analyse the efficiency of security system. In the light of this aim, this research study meets the below mentioned objectives.

To study the effectiveness and efficiency of the security system.

To determine the relationship of incident response intelligence system (IRIS) with the vulnerability of security system.

To identify the effects of Topological Security Information.

To analyse the Vulnerabilities in Security System.

To investigate the limitations of IRIS.

CHAPTER 2: LITERATURE REVIEW

Vulnerabilities in Security System

In its broadest sense, the term 'vulnerability' refers to the violation of a security policy. This may be due to weak security rules or problems within the software. In theory, all computer systems have vulnerabilities serious depends on whether or not they used to ...
Related Ads