Solved

malware , IDS, HOST INTRUSION SYSTEM

Posted on 2014-02-05
3
466 Views
Last Modified: 2014-02-06
can you please provide some good articles on folllowing

1) malware analysis tools
2) IDS. Host Intrusion sysytems
3) (DLP) Encryption Technology
4)ddOES Technologies
0
Comment
Question by:pramod1
3 Comments
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
ID: 39837913
use wikipedia and look them up yourself.  We don't do homework assignments
0
 
LVL 61

Expert Comment

by:btan
ID: 39837941
Also look at some resource below which can be comprehensive and do the key word search based on item should lead to relevant publications and article. Better to join mailing list or attend training if you want to get into more detailed specific needs

http://csrc.nist.gov/publications/PubsSPs.html
http://www.asd.gov.au/publications/
http://www.sans.org/reading-room/
http://zeltser.com
0
 
LVL 23

Accepted Solution

by:
Mohammed Hamada earned 500 total points
ID: 39838203
1- good article on Malware analyse tools
http://zeltser.com/malware-analysis-toolkit/

2- HIS/NIDS << each one of those is different and I have included an article from searchsecurity website talking about them.

https://www.sans.org/security-resources/idfaq/what_is_hips.php
http://searchsecurity.techtarget.com/definition/HIDS-NIDS
http://en.wikipedia.org/wiki/Host-based_intrusion_detection_system

3- I found this article and I think it coves coexistence of both DLP with Encryption technology and it goes a bit deep into explaining them.
take a look

http://www.chrisbrenton.org/wp-content/uploads/2010/01/encryption-dlp-keynote.pdf

4- I think you meant DDOS here?  here's a good starter article about it! You just need to put your email to see the whole article.

http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now