Arief Karfianto / 5296961
ISIT937 IT Security and Risk Management
Introduction
Research Method and Approach
Results
Conclusion
National Computer Emergency Response Team of Australia's cyber security survey on major Australian industry in 2015*:
* Australian Cyber Security Center 2015, 2015 Cyber Security Survey: Major Australian Business,
Australian Cyber Security Center, Barton, viewed 26 March 2016,
<https://www.cert.gov.au/system/files/614/691/2015-ACSC-Cyber-Security-Survey-MajorAustralian-Businesses.pdf>.
Intrusion Detection System (IDS) is needed for detecting attacks before, during and after they occur.
Source: http://static.tenable.com/oldsite/blog/img/6a00d8345495f669e20163040fbac6970d
Intrusion detection is an activity of monitoring events in a computer system or network and then analyze the result (Whitman & Mattord 2013, p. 61).
Two approaches to IDS:
Two basic IDS architecures:
M Stamp, Information security. Wiley, Hoboken, N.J., 2011, pp. 294-296.
Distributed Intrusion Detection System (DIDS)
SANS Institute's DShield DIDS
Everything is normal.
No significant new threat known.
References:
Australian Cyber Security Center 2015, 2015 Cyber Security Survey: Major Australian Business,
Australian Cyber Security Center, Barton, viewed 26 March 2016,
<https://www.cert.gov.au/system/files/614/691/2015-ACSC-Cyber-Security-Survey-MajorAustralian-Businesses.pdf>.
Bulk IP lookup locator - Enter IP Addresses to find their IP Location 2016, Ipligence.com , viewed 27 March 2016, <http://www.ipligence.com/iplocation>.
Distributed Intrusion Detection Systems: An Introduction and Review 2002, SANS Institute, viewed 26 March 2016, <https://www.sans.org/readingroom/whitepapers/detection/distributed-intrusion-detection-systems-introductionreview-897>.
FightBack Program 2016, SANS Institute, viewed 27 March 2016, <https://www.dshield.org/fightback.html>.
Infocon Internet Security 2016, SANS Institute, viewed 27 March 2016, <https://www.dshield.org/infocon.html>.
Internet Storm Center 2016, SANS Institute, viewed 27 March 2016, <https://isc.sans.edu/>.
SANS Institute: About 2016, SANS Institute, viewed 26 March 2016, <https://www.sans.org/about>. Scarfone, K & Mell, P 2010, ‘Intrusion Detection and Prevention Systems’, in P Stavroulakis, & M Stamp (ed.), Handbook of Information and Communication Security, Springer, Leipzig.
Service Name and Transport Protocol Port Number Registry 2016, Internet Assigned Number Authority, viewed 27 March 2016, <http://www.iana.org/assignments/service-names-port-numbers/service-names-portnumbers.xhtml>.
Stamp, M 2011, Information Security, Wiley, Hoboken.
TCP/UDP Port Activity - SANS Internet Storm Center 2016, SANS Internet Storm Center, viewed 27 March 2016, <https://isc.sans.edu/port.html?port=51413>.
Whitman, M & Mattord, H 2013, Management of information security, Cengage Learning, Stamford.