Thursday 31 March 2011

Intrusion Detection on System i

I found an interesting article on the IBM i security IBMSystems Magazine and I copy below some important points:

IBM Intrusion Detection System notifies you of attend to hack into, disrupt of deny service to your system



Though the term hacker is used with pride by relative old-timers who remember the glory days of self-modifying code, patched binary code and jury-rigged wire connectors, it's since taken on more negative connotations, referring to someone who breaks into computers to disrupt service or "own the machine." Traditional hackers call these scurrilous creatures "crackers." We prefer the term hackers to describe both the malicious cracker and the ethical interloper. The malicious hacker is out to steal information, drive your business to its knees or take over your machine. The ethical hacker exposes the vulnerabilities in your system defenses so you can plug the holes.

The Intrusion Detection System (IDS) in IBM* i5/OS* notifies you of attempts to hack into, disrupt or deny service to the system. Prior to IDS, i5/OS took some protective measures against these types of intrusions. However, with the new IDS support, the i5/OS system can now tell you about the intrusions.

The types of intrusions on an i5/OS system that are caught, audited and, in many cases, discarded before they become a threat are multiple kinds of attacks, scans and traffic-regulation anomalies for TCP and User Datagram Protocol (UDP). In this article, we'll explain these different intrusions and provide an example of IDS in action.


You can read the article at: IBMSystems Magazine


Enhanced by Zemanta

No comments:

Post a Comment