Technologies
by
Benjamin Tomhave
November 10, 2004
Prepared for:
Professor Dave Carothers
EMSE 218
The George Washington University
This paper or presentation is my own work. Any assistance I received in its preparation is acknowledged within the paper or presentation, in accordance with academic practice. If I used data, ideas, words, diagrams, pictures, or other information from any source, I have cited the sources fully and completely in footnotes and bibliography entries. This includes sources which I have quoted or paraphrased. Furthermore, I certify that this paper or presentation was prepared by me specifically for this class and has not been submitted, in whole or in part, to any other class in this University or elsewhere, or used for any purpose other than satisfying the requirements of this class, except that I am allowed to submit the paper or presentation to a professional publication, peer reviewed journal, or professional conference. In adding my name following the word 'Signature ', I intend that this certification will have the same authority and authenticity as a document executed with my hand-written signature.
Signature _____Benjamin L. Tomhave________________________
Benjamin L. Tomhave 12/7/2004 1Research Paper: Information Security
Technologies
by
Benjamin L. Tomhave
Abstract
The following research paper provides analysis of thirteen (13) information security technology topics, arranged in ten (10) groups, that are either commonly found or emerging within the information security industry. These topics include: Access Control
Management, Antivirus, Audit Data Reduction, Firewalls, Intrusion Detection Systems
(IDS), Intrusion Prevention Systems (IPS), Anomaly Detection Systems (ADS), Event
Correlation Systems (ECS), Network Mapping, Password Cracking, Public Key
Infrastructure, Virtual Private Network, and Vulnerability Scanning Systems. IDS, IPS,
ADS and ECS are grouped
References: Boca Raton: Auerbach, 2000. 3. Chapple, Mike. Vulnerability scanning with Nessus. Unknown: TechTarget.com, 2003, accessed 12 October 2004; available from 5. Cliff, A. Password Crackers - Ensuring the Security of Your Password. Unknown: SecurityFocus.com, 2001, accessed 12 October 2004; available from Unknown: SecurityFocus.com, 2003, accessed 12 October 2004; available from http://www.securityfocus.com/infocus/1670; Internet. 8. eBCVG IT Security. Heuristic Scanning - Where to Next?. Tel-Aviv: eBCVG, 2004, accessed 12 October 2004; available from 11. Innella, Paul. The Evolution of Intrusion Detection Systems. Unknown: SecurityFocus.com, 2001, accessed 12 October 2004; available from Benjamin L. Tomhave 12/7/2004 4812. Kanish, Bob. An Overview of Computer Viruses and Antivirus Software. Unknown: Kanish, 1996, accessed 12 October 2004; available from 13. Kay, Russell. Event Correlation. Unknown: COMPUTERWORLD, 2003, accessed 12 October 2004; available from 14. Manu. Firewall Basics. Unknown: SecurityDocs.com, 2004, accessed 06 November 2004; available from http://www.securitydocs.com/library/2413; Internet. 17. National Institute of Standards and Technology. NIST PKI Program. Washington: NIST, 2004, accessed 12 October 2004; available from http://csrc.nist.gov/pki/; Program. Washington: NIST, 2002, accessed 12 October 2004; available from http://csrc.nist.gov/rbac/rbac-impact-summary.doc; Internet. Boca Raton: Auerbach, 2000. Benjamin L. Tomhave 12/7/2004 4923. Rotchke, Ben. Access Control Systems & Methodology. New York: SecurityDocs.com, 2004, accessed 06 November 2004; available from 24. Spencer, Henry and D. Hugh Redelmeier, Opportunistic Encryption. Unknown: Freeswan.org, 2001, access 07 November 2001; available from 27. Wikipedia. Anti-virus software. St. Petersburg: Wikipedia, 2004, accessed 06 November 2004; available from http://en.wikipedia.org/wiki/Anti-viral_software; 28. Wikipedia. Computer virus. St. Petersburg: Wikipedia, 2004, accessed 06 November 2004; available from http://en.wikipedia.org/wiki/Computer_virus; Internet. 29. Wikipedia. Network Mapping. St. Petersburg: Wikipedia, 2004, accessed 12 October 2004; available from http://en.wikipedia.org/wiki/Network_Mapping; Internet. 30. Wikipedia. Password cracking. St. Petersburg: Wikipedia, 2004, accessed 12 October 2004; available from http://en.wikipedia.org/wiki/Password_cracking; Internet. 31. Wikipedia. Public key infrastructure. St. Petersburg: Wikipedia, 2004, accessed 06 November 2004; available from 32. Wikipedia. Virtual private network. St. Petersburg: Wikipedia, 2004, accessed 06 November 2004; available from 33. Yip Chung, Christina. Anomaly Detection in Database Systems. Davis: UC Davis Computer Security Laboratory, 1999, accessed 12 October 2004; available from