Security and intrusion
Computer system that is safe and reliable system that can be trusted and the work in accordance with the policy management system that is applied. Computer security (Computer security), [7], is the process of security and detection possibilities of the use of computers by people who do not have the right (intruder) access all the information you have. There are 4 security classification system, [6], namely: physical security, security-related people, data security, and media and communications, and security operations. The last two can be purely non-physical security. In the implementation, especially the operational policy, security must setransparan possible for all users. This is important because the security information associated with the 3 aspects that must be held firm, [6, 7, 11]:
a) The information is only for those with the correct access (confidentiality).
b) The information can only be modified by the authority (integrity).
c) The information can be accessed for the need to take time (availability).
The components include security devices such as a physical firewall and non-physical IDRS for example, [6, 11, 12]. Firewall only limited control as a means of passive activities. IDRS activities with a proactive real-time, who can not stop saying the network to detect the possible existence of a suspicious activity / intrusion. If IDRS to detect the intrusion it will automatically record and stop it before the damage to the system.
Intrusion can be defined [2] as the access to the computer system by users who do not have rights such as a hacker or cracker, or access by which one has the right but the order and blame. Attacks is intrusion of the computer security system, because it can destroy the trust. To keep the system reliable and do a lot of research to develop intrusion detection. In general there are 2 models for intrusion detection, [2], namely:
a) Misuse detection model, the signature detection by searching dots weak system that can dideskripsi by a pattern or a line of events / data.
b) Anomaly detection model, based on detection of changes in patterns or system behavior. How is that done by building a statistical model containing a single-unit measurement equipment (metric) value will be taken from the activity system.
So IDRS is a software application that tries to intrusion detection model with one or a combination of both these models.
Support Manusia Biasa in wisata seo sadau thanks before.....
0 komentar:
Post a Comment