Standards and Practices Necessary To Implement a Successful Security Review Program for Intrusion Management Systems

dc.contributor.advisor Tuğlular, Tuğkan
dc.contributor.author Doruk, Alpay
dc.contributor.author Tuğlular, Tuğkan
dc.date.accessioned 2014-07-22T13:52:11Z
dc.date.available 2014-07-22T13:52:11Z
dc.date.issued 2002
dc.description Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2002 en_US
dc.description Includes bibliographical references (leaves: 84-85) en_US
dc.description Text in English; Abstract: Turkish and English en_US
dc.description viii, 91 leaves en_US
dc.description.abstract Intrusion Management Systems are being used to prevent the information systems from successful intrusions and their consequences. They also have detection features. They try to detect intrusions, which have passed the implemented measures. Also the recovery of the system after a successful intrusion is made by the Intrusion Management Systems. The investigation of the intrusion is made by Intrusion Management Systems also. These functions can be existent in an intrusion management system model, which has a four layers architecture. The layers of the model are avoidance, assurance, detection and recovery. At the avoidance layer necessary policies, standards and practices are implemented to prevent the information system from successful intrusions. At the avoidance layer, the effectiveness of implemented measures are measured by some test and reviews. At the detection layer the identification of an intrusion or intrusion attempt is made in the real time. The recovery layer is responsible from restoring the information system after a successful intrusion. It has also functions to investigate the intrusion. Intrusion Management Systems are used to protect information and computer assets from intrusions. An organization aiming to protect its assets must use such a system. After the implementation of the system, continuous reviews must be conducted in order to ensure the effectiveness of the measures taken. Such a review can achieve its goal by using principles and standards. In this thesis, the principles necessary to implement a successful review program for Intrusion Management Systems have been developed in the guidance of Generally Accepted System Security Principles (GASSP). These example principles are developed for tools of each Intrusion Management System layer. These tools are firewalls for avoidance layer, vulnerability scanners for assurance layer, intrusion detection systems for detection layer and integrity checkers for recovery layer of Intrusion Management Systems. en_US
dc.identifier.uri https://hdl.handle.net/11147/3706
dc.language.iso en en_US
dc.publisher Izmir Institute of Technology en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject.lcc TK5105.59 D67 2002 en
dc.subject.lcsh Computer networks--Security measures en
dc.subject.lcsh Firewalls (Computer security) en
dc.title Standards and Practices Necessary To Implement a Successful Security Review Program for Intrusion Management Systems en_US
dc.type Master Thesis en_US
dspace.entity.type Publication
gdc.author.institutional Doruk, Alpay
gdc.coar.access open access
gdc.coar.type text::thesis::master thesis
gdc.description.department Thesis (Master)--İzmir Institute of Technology, Computer Engineering en_US
gdc.description.publicationcategory Tez en_US
relation.isAuthorOfPublication.latestForDiscovery 7f52fb71-3121-46a6-a461-2ff1b28d9fa1
relation.isOrgUnitOfPublication.latestForDiscovery 9af2b05f-28ac-4014-8abe-a4dfe192da5e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Name:
T000125.pdf
Size:
511.12 KB
Format:
Adobe Portable Document Format
Description:
MasterThesis

License bundle

Now showing 1 - 1 of 1
Loading...
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: