PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
April 2002

Information security buzz: What isn't intrusion prevention?

One thing everybody can agree on is that infosecurity is hard. Think about it: It's one of the few things that touches every layer of the IT infrastructure-physical, network, application, OS, etc. And that's only the half of it. Securing the other half-the carbon-based units operating all this technology-makes the other stuff look easy. Vendors have a nasty habit of taking what's hard and making it even harder. Take "intrusion prevention," the latest buzz phrase for a bevy of recently released host security tools. The phrase first cropped up about two years ago when a company named Click-Net launched a product called Entercept (the company subsequently renamed itself after the software). Entercept took a then-unique approach to host security by essentially wrapping the OS kernel with an agent that intercepted and evaluated system calls against a database of defined attacks and generic attack behaviors. Depending on the nature of the request, Entercept would permit or terminate the action, thereby "preventing" attacks such as ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Becky Bace: The IDS security den mother

    by  Richard Thieme

    Former NSA employee and "den mother of computer security" Becky Base built an impressive and successful career that has undeniably influenced the industry.

  • Four computer forensics books worth investigating

    by  Gary C. Kessler & Michael Schirling

    Check out four computer forensics books that can help you learn the ins and outs of computer forensics technology and laws in place to manage cybercrime.

  • Do's and don'ts of building a forensics workstation

    by  Elizabeth A. Genco

    Elizabeth Genco explains the pros and cons of building a forensics workstation from scratch. Read now to learn what forensic tools are beneficial and which ones aren't.

Columns in this issue

  • Secure reads: Wireless Security

    by  Randall K. Nichols & Panos C. Lekkas

    Wireless Security offers a detailed overview of wireless security topics and covers big-picture characteristics of today's wireless security technologies.