Information Security 08 Intrusion Detection and Response
Information Security 08 Intrusion Detection and Response
ArfanShahzad.com
Course Outline
ArfanShahzad.com
Intrusion Detection and Response
ArfanShahzad.com
Intrusion Detection and Response cont…
ArfanShahzad.com
Intrusion Detection and Response cont…
• This alarm can be audible and/or visual (producing noise and lights,
respectively), or it can be silent (an e-mail message alert).
ArfanShahzad.com
Intrusion Detection and Response cont…
ArfanShahzad.com
Intrusion Detection and Response cont…
• It aims to protect the network and its assets from malicious activities
and minimize the impact of security incidents.
ArfanShahzad.com
Intrusion Detection and Response cont…
1. Monitoring
2. Detection
3. Alerting
4. Investigation
5. Response
6. Reporting
ArfanShahzad.com
Intrusion Detection and Response cont…
ArfanShahzad.com
Intrusion Detection and Response cont…
ArfanShahzad.com
Intrusion Detection and Response cont…
ArfanShahzad.com
Intrusion Detection and Response cont…
• This may involve analyzing log files, examining network traffic, and
gathering evidence to understand the root cause and impact of the
incident.
ArfanShahzad.com
Intrusion Detection and Response cont…
ArfanShahzad.com
Intrusion Detection and Response cont…
ArfanShahzad.com
Intrusion Detection and Response cont…
ArfanShahzad.com