MODERN APPROACH TO PROTECTION OF COMPUTER SYSTEMS AND NETWORKS
DOI:
https://doi.org/10.47839/ijc.2.3.240Keywords:
Firewalls, intrusion detection systems, scanners, vulnerability assessment tools, penetration testingAbstract
This article is dedicated to the use of firewalling method and intrusion detection method, which can be applied both separately and together to computer systems and networks, to expedience of the use of that or other method, tools, that perform these methods. We will try to carry out the analysis of the modern state of security questions in computer networks, to give recommendations how to attain the greatest level of protection of computer systems and networks by most effective way - within the shortest time interval, with minimum financial expenditures.References
Aurobindo Sundaram. An introduction to Intrusion Detection. 1996.
http:// www.borderware.com
Lukatskyj A.V. Attack Detection. –SPb.: BHV-Petersburg, 2001.
http://www.alliancedatacom.com/manufacturers/cisco-systems/security_vpn/ids.asp
http://www.cs.uidaho.edu/~hummer
http://www.cs.purdue.edu/coast/projects/autonomous-agents.html
http://www.psionic.com/abacus/hostsentry/
http://www.tripwiresecurity.com
http://www.cs.tut.fi/~rammer/aide.html
http://www.stanford.edu/~atkins/swatch/
http://www.cert.dfn.de/eng/logsurf/
http://www.all.net/dtk/dtk.html
http://www.net.tamu.edu/network/tools/tiger.html
http://www.insecure.org/tools.html
http://www.gfi.com/lannetscan/
http://www.eeye.com/html/Products/Retina/
http://www.saintcorporation.com/saint/
http://www.safety-lab.com/en2/products/1.htm
http://www.cirt.net/code/nikto.shtml
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.