Intrusion Detection and Honeypots
April 27, 2007
AO Spotlight: Catch up on the latest AntiOnline security and tech discussions. This week: the difference between IDSes and honeypots; starting a career in information security; keeping data safe in a Web 2.0 world; and an OS usage poll.
IDS & Honeypot - Differences?
At a high level overview:
1. An IDS is just what it says: Intrusion Detection System. You are looking for unusual and (presumably) unauthorized attempts to ingress and possibly egress (with valuable data) your systems.
2. A "honeypot" is a term derived from old-fashioned methods of disposing of unwanted flying insects. Wasps, flies and such (Hornets and bees are excluded, but might be inadvertently caught if you design and execute inadequately).
Information Security Career?
If you are serious, these are the ways to go:
http://www.nsa.gov/ia/index.cfm (have to dig around to see participating schools.
Check this site for participating schools in Cyber Corps program
The Federal Cyber Corps Program
The Cyber Corps Program is open to students currently completing their junior year of undergraduate school or first-year of graduate school. In addition to a stipend of approximately $1,000 per month, the Program pays for each student's tuition for two years, room and board, and travel to conferences.
After one year of training, students complete a summer internship in a federal agency, learning first-hand about computer security issues and putting into practice what they've learned in class. By the end of the second year students earn an undergraduate or graduate degree in computer science in addition to multiple federal-level computer security certificates as endorsed by the Committee on National Security Systems (CNSS).
Security of "Web 2.0"
The pros as far as I'm concerned are:
* Documents are available anywhere on any PC
* All PCs in a network are always running the same version
* Performance depends on how many other people in the world are doing the same thing
* A system with more users is inherently less secure.
* Any breach of security will allow access to a LOT more data than storing on local workstations or local networks.
Poll: Which OS are you running?
Wondering which OS our members prefer? Vote for your OS in this poll.
Fun trivia to close the work week.
Also, be sure catch up on today's posts. Not a member? Join today!