Solved

malware , IDS, HOST INTRUSION SYSTEM

Posted on 2014-02-05
3
482 Views
Last Modified: 2014-02-06
can you please provide some good articles on folllowing

1) malware analysis tools
2) IDS. Host Intrusion sysytems
3) (DLP) Encryption Technology
4)ddOES Technologies
0
Comment
Question by:pramod1
3 Comments
 
LVL 80

Expert Comment

by:David Johnson, CD, MVP
ID: 39837913
use wikipedia and look them up yourself.  We don't do homework assignments
0
 
LVL 63

Expert Comment

by:btan
ID: 39837941
Also look at some resource below which can be comprehensive and do the key word search based on item should lead to relevant publications and article. Better to join mailing list or attend training if you want to get into more detailed specific needs

http://csrc.nist.gov/publications/PubsSPs.html
http://www.asd.gov.au/publications/
http://www.sans.org/reading-room/
http://zeltser.com
0
 
LVL 24

Accepted Solution

by:
Mohammed Hamada earned 500 total points
ID: 39838203
1- good article on Malware analyse tools
http://zeltser.com/malware-analysis-toolkit/

2- HIS/NIDS << each one of those is different and I have included an article from searchsecurity website talking about them.

https://www.sans.org/security-resources/idfaq/what_is_hips.php
http://searchsecurity.techtarget.com/definition/HIDS-NIDS
http://en.wikipedia.org/wiki/Host-based_intrusion_detection_system

3- I found this article and I think it coves coexistence of both DLP with Encryption technology and it goes a bit deep into explaining them.
take a look

http://www.chrisbrenton.org/wp-content/uploads/2010/01/encryption-dlp-keynote.pdf

4- I think you meant DDOS here?  here's a good starter article about it! You just need to put your email to see the whole article.

http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Window update errors on VMs 9 46
Home firewall recommendations 11 86
Video enhancement recommendation 7 77
Microsoft ATA (Advance Threat Analytics) 2 20
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question