Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/3706
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorTuğlular, Tuğkanen
dc.contributor.authorDoruk, Alpay-
dc.date.accessioned2014-07-22T13:52:11Z-
dc.date.available2014-07-22T13:52:11Z-
dc.date.issued2002en
dc.identifier.urihttp://hdl.handle.net/11147/3706-
dc.descriptionThesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2002en
dc.descriptionIncludes bibliographical references (leaves: 84-85)en
dc.descriptionText in English; Abstract: Turkish and Englishen
dc.descriptionviii, 91 leavesen
dc.description.abstractIntrusion Management Systems are being used to prevent the information systems from successful intrusions and their consequences. They also have detection features. They try to detect intrusions, which have passed the implemented measures. Also the recovery of the system after a successful intrusion is made by the Intrusion Management Systems. The investigation of the intrusion is made by Intrusion Management Systems also. These functions can be existent in an intrusion management system model, which has a four layers architecture. The layers of the model are avoidance, assurance, detection and recovery. At the avoidance layer necessary policies, standards and practices are implemented to prevent the information system from successful intrusions. At the avoidance layer, the effectiveness of implemented measures are measured by some test and reviews. At the detection layer the identification of an intrusion or intrusion attempt is made in the real time. The recovery layer is responsible from restoring the information system after a successful intrusion. It has also functions to investigate the intrusion. Intrusion Management Systems are used to protect information and computer assets from intrusions. An organization aiming to protect its assets must use such a system. After the implementation of the system, continuous reviews must be conducted in order to ensure the effectiveness of the measures taken. Such a review can achieve its goal by using principles and standards. In this thesis, the principles necessary to implement a successful review program for Intrusion Management Systems have been developed in the guidance of Generally Accepted System Security Principles (GASSP). These example principles are developed for tools of each Intrusion Management System layer. These tools are firewalls for avoidance layer, vulnerability scanners for assurance layer, intrusion detection systems for detection layer and integrity checkers for recovery layer of Intrusion Management Systems.en
dc.language.isoenen_US
dc.publisherIzmir Institute of Technologyen
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subject.lccTK5105.59 D67 2002en
dc.subject.lcshComputer networks--Security measuresen
dc.subject.lcshFirewalls (Computer security)en
dc.titleStandards and practices necessary to implement a successful security review program for intrusion management systemsen_US
dc.typeMaster Thesisen_US
dc.institutionauthorDoruk, Alpay-
dc.departmentThesis (Master)--İzmir Institute of Technology, Computer Engineeringen_US
dc.relation.publicationcategoryTezen_US
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeMaster Thesis-
item.languageiso639-1en-
item.fulltextWith Fulltext-
Appears in Collections:Master Degree / Yüksek Lisans Tezleri
Files in This Item:
File Description SizeFormat 
T000125.pdfMasterThesis511.12 kBAdobe PDFThumbnail
View/Open
Show simple item record



CORE Recommender

Page view(s)

82
checked on Apr 22, 2024

Download(s)

48
checked on Apr 22, 2024

Google ScholarTM

Check





Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.