Matakuliah Tahun Versi :A0334/Pengendalian Lingkungan Online : 2005 : 1/1 Pertemuan 9 Software Protection 1 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : • Mahasiswa dapat menyatakan Software Protection 2 Outline Materi • Corporate profile: Proseq – – – – – What Do We Do? How Do We Do It? The Bottom Line Vulnerability Update and Testing Service Our Centre of Excellence and Our Partners • Intrusion Detection – IDS Acceptance as A Recognised Component to Security – IDS Is Not ‘Fire and Forget’ – IDS Should Be part of Your Reaction to The Threat – Management by Specialist 3 Corporate Profile: Proseq • In an increasingly uncertain world there’s one thing that you can be sure of – someone, somewhere is a busing your network or the services that are key to your business, be it on the Internet or on a private network. 4 What Do We Do? • In a nutshell, our partners either integrate our service to provide secure Internet services, or they provide unique security services with the required level of local support. 5 How Do We Do It? • Our partners provide our customers with everything from simple standarised security monitoring and handling SLAs to bespoke SLAs, integrating data and sensors from a variety of sources and not only the standard intrusion detection systems (IDSs). 6 The Bottom Line • Of course, network abuse management isn’t just for fun. 7 Vulnerability Update and Testing Service • Our well-established Vulnerability Update and testing service provides customers with the very latest information on all known vulnerability discoveries and will even advise you when new patches become available. 8 Our Centre of Excellence and Our Partners • Naturally, while we make good use of our state-of-the-art software and hardware facilities, the one thing that we have become famous for is our highly trained and dedicated personnel. 9 Intrusion Detection • IDS Acceptance as A Recognised Component to Security • IDS Is Not ‘Fire and Forget’ • IDS Should Be part of Your Reaction to The Threat • Management by Specialist 10 IDS Acceptance as A Recognised Component to Security • A common analogy applied to intrusion detection systems and firewalls is that of your home. • It is common practice for people to buy an alarm or even a dog to complement the locks and doors of a house. 11 IDS IS Not ‘Fire and Forget’ • There are two key points to remember regarding intrusion detection: – It does not assess and anticipate vulnerabilities in the network so much as monitor those areas of the network that administrators believe are vulnerable. – It does not automatically protect and secure a network once it detects an attack. 12 IDS Should Be Part of Your Reaction to The Threat • Compaq estimate that the average financial trading house. 13 Management by Specialists • The nature of intrusion detection integrates with the ‘managed security’ model to a greater extent than perhaps any other security technology. • Intrusion detection should be a technology explored by any company that is serious about the threat inherent in today’s connected business world. 14 The End 15
© Copyright 2026 Paperzz