Advanced persistent threat monitoring system
Material type:
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | Not for loan | R-728 |
Master of Science in Computer Science and Information security 2013-2015 EXT Meraj Uddin Jenson Jacob "Mirox Cyber Security and Pvt Ltd"
Attackers will eventually find their way into their target’s network, often employing social engineering tactics to steal credentials and obtain access. The APT detection system enables organization to have defence in depth methodology. The APT has a combination of modules like IDS, IPS and UTM, works as correlate rules with each other for complete defence. The firewall provides basic protection against attacks and UTM provides gateway level protection. The IDS detects any sort of anomaly behaviour. IPS detects and prevents vulnerability exploits in the network. In short the APT is incorporation of all security modules working together as a grid to provide state of the art defence system. It detects low and slow attacks which doesn't generate usual alarms. The APT –Detects, Analyse, Adapt, Respond to any kind of attacks that compromise any network.
There are no comments on this title.