Today, Mr. Zaki cover 2 lecture; lecture 9: Intrusion Detection System (IDS) and lecture 10: Legal and Ethical issues in computer security. First, Mr. Zaki explains the lecture IDS. Topic that cover in lecture IDS are intruders, security intrusion & detection, types of IDS, IDS techniques, SNORT and Honeypots.
Intruders mean significant issue hostile/unwanted trespass, user trespass or software trespass. While example of intrusion are remote root compromise, web server defacement, guessing or cracking passwords. Security intrusion is a security event, or combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so.
Intrusion detection is a security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of attempts to access system resources in an unauthorized manner.
There are 3 types of IDS; host IDS, Network IDS and distributed IDS. Host IDS is a specialized software to monitor system activity to detect suspicious behavior. Two approaches that often used in combination are anomaly detection and signature detection. Anomaly detection defines normal or expected behavior such as threshold detection or profile based; while signature detection is defines proper behavior.
Network IDS is to monitor traffic at selected point on a network. It can detect intrusion patterns and may examine network, transport or application level protocol activity directed toward systems.
After that, Mr. Zaki explains the Intrusion Detection Techniques and Honeypots. Then Mr. Zaki continues the class with lecture 10 Legal and Ethical issues in computer security. Legal also know as law is a rule of conduct or action prescribed or formally recognized as binding or enforced by a controlling authority; while Ethics is a set of moral principles or values. It is an objectively defined standard of right and wrong.
Law also has public law and private law. Private law focuses on individual relationships while public law addresses regulatory agencies. Deterrence can prevent an illegal or unethical activity from occurring. Deterrence requires significant penalties, a high probability of apprehension, and an expectation of expectation of enforcement of penalties.
Legal and Ethical are important in computer security; this is because it can prevent computer crime such as hacking.
This week is the last lecture class for the Information Technology Security. I very appreciate Mr. Zaki teaches us and I also can know more about internet security. Thank you.