Intrusion Detection Made Simple & Incident Handling for the Very Very Nervous

9/15/98


Click here to start


Table of Contents

Intrusion Detection Made Simple & Incident Handling for the Very Very Nervous

What do we need?

Discouraging Intrusions

Preventing Intrusions

Detecting Intrusions

Honey Pots

Commercial IDS systems

Non-Commercial IDS

About Shadow

Where to put what?

Binary Checking a.k.a. “What to do when it all over”

The basic intrusion types

Port Scans / Host Scans

Tree walks

Single/Multiple Packet Attacks

Denial of Service Attacks

Okay so now you’re being hacked

Incident Handling

Preparation

Identification

Containment

Eradication

Recovery

Lessons Learned

Policies for Intrusions

Procedures for Intrusions

What else do we need?

Important URLs

Important URLs (cont.)

More Important URLs

Even More Important URLs

Author: Scott C. Kennedy

Email: skennedy@qualcomm.com

Home Page: http://www.qualcomm.com

Download presentation source