Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Steve Lodin

    Intrusion detection systems (also known as ID systems or IDS for short) are one of the latest security tools in the battle against hackers. The intrusion detection marketplace is extremely dynamic currently, new products being introduced... more
    Intrusion detection systems (also known as ID systems or IDS for short) are one of the latest security tools in the battle against hackers. The intrusion detection marketplace is extremely dynamic currently, new products being introduced and smaller, single product security companies being purchased by bigger security companies with the aspiration to provide full range security solutions. Current intrusion detection systems provide information about attempted and successful attacks, and can even perform limited counterattacks. This whitepaper provides basic intrusion detection information such as intrusion classification and intrusion detection system taxonomy. It then provides a categorized list of criteria that can be used to evaluate potential intrusion detection systems for selection and implementation. Finally, a method for employing these criteria is presented. Basic Intrusion Detection Information What Is An Intrusion? An intrusion can be defined as: any set of actions that ...
    This paper describes the design and implementation of a secure message broadcast system (SMBS). It is a secure, multi-party chat program that ensures privacy in communication and does not rely on shared secret keys. The system was built... more
    This paper describes the design and implementation of a secure message broadcast system (SMBS). It is a secure, multi-party chat program that ensures privacy in communication and does not rely on shared secret keys. The system was built as a study of the feasibility of building effective communication tools using zero knowledge proofs.
    This paper describes the design and implementation of a secure message broadcast system SMBS. It is a secure, multi-party chat program that ensures privacy in communication and does not rely on shared secret keys. The system was built as... more
    This paper describes the design and implementation of a secure message broadcast system SMBS. It is a secure, multi-party chat program that ensures privacy in communication and does not rely on shared secret keys. The system was built as a study of the feasibility of building effective communication tools using zero knowledge proofs.
    Intrusion detection systems (also known as ID systems or IDS for short) are one of the latest security tools in thebattle against hackers. The intrusion detection marketplace is extremely dynamic currently, new products beingintroduced... more
    Intrusion detection systems (also known as ID systems or IDS for short) are one of the latest security tools in thebattle against hackers. The intrusion detection marketplace is extremely dynamic currently, new products beingintroduced and smaller, single product security companies being purchased by bigger security companies with theaspiration to provide full range security solutions. Current intrusion detection systems provide information
    Whether a computer is in a corporation, government agency, university, small business, or at home, if it is linked to a network, hackers are a risk. The first line of defense against them is a firewall, provided it is set up correctly.... more
    Whether a computer is in a corporation, government agency, university, small business, or at home, if it is linked to a network, hackers are a risk. The first line of defense against them is a firewall, provided it is set up correctly. Firewall technology is a set of mechanisms that collectively enforce a security policy on communication traffic entering or leaving a guarded network domain. The security policy is the overall plan for protecting the domain. Embodied in hardware, software, or both, a firewall guards and isolates the domain. Broadly, firewalls attempt to maintain privacy and ensure the authenticity of data communications that pass through their domain's boundaries. Whether data is entering or leaving a domain, it is protected from eavesdropping (passive wiretapping) and change (active wiretapping). But only communication traffic entering or leaving a domain comes under the influence of firewall technology