Intrusion detection: running a hacker simulation
The cost of worldwide intellectual property theft, much of which occurs as a result of corporate espionage conducted through the Internet, may be as high as US$300 billion per year, according to industry watchers.
The most powerful government and multinational corporate systems are hacked on a daily - sometimes hourly - basis, and many such incursions make headline news. In particular, security experts have reported a massive increase in the number of automated vulnerability scans on company networks.
Despite this storm of assaults, some IT managers think they are immune to hacking disasters - and must be convinced otherwise. Perhaps the best way to accomplish this, according to security companies, is to become the "enemy" and, through hacker simulations, show how easy it is to disrupt almost any system.
[ Read more ]
- Article: Structural versus Operational Intrusion Detection (8 April 2002)
- Article: Interpreting Network Traffic: A Network Intrusion Detector's Look At Suspicious Events (4 April 2002)
- Article: Network Intrusion Detection of Third Party Effects (4 April 2002)
- Article: Information Warfare: When Intrusion Detection Isn't Enough (1 April 2002)
- Article: Traditional Intrusion Detection Model Outdated and Distracting (1 April 2002)