11321

IT Management Daily
Storage Daily
Security Daily
FREE NEWSLETTERS
search
 

follow us on Twitter


internet.commerce
Be a Commerce Partner

internet.com
IT
Developer
Internet News
Small Business
Personal Technology

Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers


Related Articles
AO Security Discussion Roundup

Security Products
 Bulletproof Public PC (Pc-Safety)
 Outlook Duplicates Remover (Outlook Duplicates Remover)
 Power Registry Suit (GETVideoSoft)
 Secure Email (Secure Email)
 Password Genie (SecurityCoverage, Inc.)
 PC Cop (Maximum Software)
» Enterprise IT Planet » Security » Security Features

Intrusion Detection and Honeypots

April 27, 2007

Email Print Digg This Add to del.icio.us

AO Spotlight: Catch up on the latest AntiOnline security and tech discussions. This week: the difference between IDSes and honeypots; starting a career in information security; keeping data safe in a Web 2.0 world; and an OS usage poll.

IDS & Honeypot - Differences?
nihil's contribution:

At a high level overview:

1. An IDS is just what it says: Intrusion Detection System. You are looking for unusual and (presumably) unauthorized attempts to ingress and possibly egress (with valuable data) your systems.

2. A "honeypot" is a term derived from old-fashioned methods of disposing of unwanted flying insects. Wasps, flies and such (Hornets and bees are excluded, but might be inadvertently caught if you design and execute inadequately).

Information Security Career?
not_it's contribution:

If you are serious, these are the ways to go: http://www.nsa.gov/ia/index.cfm (have to dig around to see participating schools.
(or)
Check this site for participating schools in Cyber Corps program http://www.sfs.opm.gov/.

The Federal Cyber Corps Program

The Cyber Corps Program is open to students currently completing their junior year of undergraduate school or first-year of graduate school. In addition to a stipend of approximately $1,000 per month, the Program pays for each student's tuition for two years, room and board, and travel to conferences.

After one year of training, students complete a summer internship in a federal agency, learning first-hand about computer security issues and putting into practice what they've learned in class. By the end of the second year students earn an undergraduate or graduate degree in computer science in addition to multiple federal-level computer security certificates as endorsed by the Committee on National Security Systems (CNSS).

Security of "Web 2.0"
Aardpsymon's contribution:



The pros as far as I'm concerned are:
* Documents are available anywhere on any PC
* All PCs in a network are always running the same version

Cons:
* Performance depends on how many other people in the world are doing the same thing
* A system with more users is inherently less secure.
* Any breach of security will allow access to a LOT more data than storing on local workstations or local networks.

Poll: Which OS are you running?
Wondering which OS our members prefer? Vote for your OS in this poll.

Random Facts
Fun trivia to close the work week.

Also, be sure catch up on today's posts. Not a member? Join today!

Email Print Digg This Add to del.icio.us

Security Features Archives