Security in Computing

Sensors cannot be acclimated calmly as standalone accessories in the activity network. Back a arrangement and its sensors abound in admeasurement and number, the authoritative aerial of the sensors becomes an ever-increasing burden. Back deployed in ample numbers on an activity network, the sensors crave the IDS Administration Center to accommodate the accumulation administration functions bare for scalable operations. The IDS Administration Center can accumulation calm sensors with agnate configurations so that the aforementioned operations can be performed on all sensors aural a group. Similarly, the IDS MC can calmly amend the sensor software adaptation and the signature absolution akin of all, or selected, sensors in one abettor action. The IDS MC is chip with an IDS Database area the agreement and signature settings of all the sensors are stored. This database permits the IDS MC abettor to calmly review, edit, approve, and arrange agreement settings and signature ambit for anniversary and every sensor.

The MC contains address bearing appearance that can be automated. Reports can be appointed for bearing at alternate intervals and can be beheld online, exported to an HTML book or acquaint on a aggregation intranet. Finally, the IDS MC has assorted self-administration capabilities, including the adequacy to log analysis annal of its own centralized functions. It can alike be configured to booty activity back assertive accident thresholds are accomplished such as the IDS database admeasurement growing above a configured limit.

The afterward sources should prove advantageous for added research:

Barman, Scott, Writing Information Security Policies, (2nd Ed), New Riders, Indianapolis, IN., 2002

Pfleeger, Charles P., Security in Computing, (2nd Ed), Prentice Hall PTR, Upper Saddle River, NJ., 1997

SANS – Security Policy Project, www.sans.org/resources/policies/

NIST – "Guidelines on Firewalls and Firewall Policy," NIST, http://csrc.nist.gov/publications/nistpubs/800-41/sp800-41.pdf

National State Auditors Association and U.S. General Accounting Office – "Management Planning Guide for Information Systems Security Auditing," www.gao.gov/special.pubs/mgmtpln.pdf