download

Matakuliah
Tahun
Versi
:A0334/Pengendalian Lingkungan Online
: 2005
: 1/1
Pertemuan 9
Software Protection
1
Learning Outcomes
Pada akhir pertemuan ini, diharapkan mahasiswa
akan mampu :
• Mahasiswa dapat menyatakan Software
Protection
2
Outline Materi
• Corporate profile: Proseq
–
–
–
–
–
What Do We Do?
How Do We Do It?
The Bottom Line
Vulnerability Update and Testing Service
Our Centre of Excellence and Our Partners
• Intrusion Detection
– IDS Acceptance as A Recognised Component to
Security
– IDS Is Not ‘Fire and Forget’
– IDS Should Be part of Your Reaction to The Threat
– Management by Specialist
3
Corporate Profile: Proseq
• In an increasingly uncertain world there’s
one thing that you can be sure of –
someone, somewhere is a busing your
network or the services that are key to
your business, be it on the Internet or on a
private network.
4
What Do We Do?
• In a nutshell, our partners either integrate
our service to provide secure Internet
services, or they provide unique security
services with the required level of local
support.
5
How Do We Do It?
• Our partners provide our customers with
everything from simple standarised
security monitoring and handling SLAs to
bespoke SLAs, integrating data and
sensors from a variety of sources and not
only the standard intrusion detection
systems (IDSs).
6
The Bottom Line
• Of course, network abuse management
isn’t just for fun.
7
Vulnerability Update and Testing
Service
• Our well-established Vulnerability Update
and testing service provides customers
with the very latest information on all
known vulnerability discoveries and will
even advise you when new patches
become available.
8
Our Centre of Excellence and Our
Partners
• Naturally, while we make good use of our
state-of-the-art software and hardware
facilities, the one thing that we have
become famous for is our highly trained
and dedicated personnel.
9
Intrusion Detection
• IDS Acceptance as A Recognised
Component to Security
• IDS Is Not ‘Fire and Forget’
• IDS Should Be part of Your Reaction to
The Threat
• Management by Specialist
10
IDS Acceptance as A Recognised
Component to Security
• A common analogy applied to intrusion
detection systems and firewalls is that of
your home.
• It is common practice for people to buy an
alarm or even a dog to complement the
locks and doors of a house.
11
IDS IS Not ‘Fire and Forget’
• There are two key points to remember
regarding intrusion detection:
– It does not assess and anticipate
vulnerabilities in the network so much as
monitor those areas of the network that
administrators believe are vulnerable.
– It does not automatically protect and secure a
network once it detects an attack.
12
IDS Should Be Part of Your Reaction to
The Threat
• Compaq estimate that the average
financial trading house.
13
Management by Specialists
• The nature of intrusion detection
integrates with the ‘managed security’
model to a greater extent than perhaps
any other security technology.
• Intrusion detection should be a technology
explored by any company that is serious
about the threat inherent in today’s
connected business world.
14
The End
15