Solved

malware , IDS, HOST INTRUSION SYSTEM

Posted on 2014-02-05
3
491 Views
Last Modified: 2014-02-06
can you please provide some good articles on folllowing

1) malware analysis tools
2) IDS. Host Intrusion sysytems
3) (DLP) Encryption Technology
4)ddOES Technologies
0
Comment
Question by:pramod1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 81

Expert Comment

by:David Johnson, CD, MVP
ID: 39837913
use wikipedia and look them up yourself.  We don't do homework assignments
0
 
LVL 63

Expert Comment

by:btan
ID: 39837941
Also look at some resource below which can be comprehensive and do the key word search based on item should lead to relevant publications and article. Better to join mailing list or attend training if you want to get into more detailed specific needs

http://csrc.nist.gov/publications/PubsSPs.html
http://www.asd.gov.au/publications/
http://www.sans.org/reading-room/
http://zeltser.com
0
 
LVL 24

Accepted Solution

by:
Mohammed Hamada earned 500 total points
ID: 39838203
1- good article on Malware analyse tools
http://zeltser.com/malware-analysis-toolkit/

2- HIS/NIDS << each one of those is different and I have included an article from searchsecurity website talking about them.

https://www.sans.org/security-resources/idfaq/what_is_hips.php
http://searchsecurity.techtarget.com/definition/HIDS-NIDS
http://en.wikipedia.org/wiki/Host-based_intrusion_detection_system

3- I found this article and I think it coves coexistence of both DLP with Encryption technology and it goes a bit deep into explaining them.
take a look

http://www.chrisbrenton.org/wp-content/uploads/2010/01/encryption-dlp-keynote.pdf

4- I think you meant DDOS here?  here's a good starter article about it! You just need to put your email to see the whole article.

http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
parent control advice for app searches 4 74
Multi Factor Authentication for MSPs 4 38
VPN Exposure 19 44
protecting from the ransomware going around 9 81
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Many of you may be aware of the recent Google Docs scam emails that have been floating around coming from various people that you know. Here's a guide on identifying How To Identify the Scam Email You will see an email from someone you’ve had co…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question