preview

Dynamic Vulnerability Analysis, Intrusion Detection, And Incident Response

Better Essays

Dynamic Vulnerability Analysis, Intrusion
Detection, and Incident Response
Kevin M. Smith
CSEC662 – University of Maryland, University College
31 May 15

TABLE OF CONTENTS
Overview 3
Greiblock Credit Union Policy Regarding Dynamic Vulnerability Analysis, Intrusion Detection, and Incident Response 6
Purpose 6
Scope 6
Policy 6
Dynamic Vulnerability Analysis 6
Intrusion Detection 7
Incident Response 8
Enforcement 9
Dynamic Vulnerability Analysis 9
Intrusion Detection 9
Incident Response 9
Metrics 10
Dynamic Vulnerability Analysis 10
Intrusion Detection 10
Incident Response 11
References 12

OVERVIEW
With the increase in threats over the past few years it is no longer acceptable for an organization to feel data is protected …show more content…

• Determining what hardware underlies applications and data – to identify servers (both physical and virtual), web based applications, and data storage devices that hold critical and sensitive data.
• Mapping of network infrastructure – to understand the network devices that applications and hardware depend on for secure performance.
• Identification of controls already in place – including policies, firewalls, applications, intrusion and detection prevention systems, virtual private networks, data loss prevention and encryption.
• Running vulnerability scans – to identify known vulnerabilities within an organizational system.
• Application of context to scan results – to determine which infrastructure vulnerabilities should be targeted first and most aggressively.
The goal of intrusion detection is to monitor network assets, detect anomalous behavior, and identify misuse within a network (Ashoor, Gore, 2011). An intrusion detection system (IDS) is a device or software application that monitors network system activities for malicious activity or policy violations and produces reports to a management station (Kashyap, Agrawal, Pandey, Keshri, 2013), additionally there are three types of IDS:
• Host based IDS – monitors a computer system on which it is installed in order to detect intrusion or misuse by analyzing several types of logs files including kernel, system, server, network and firewall logs, and compares logs with signatures for known attacks.
• Network based

Get Access