Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/3463
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Tuğlular, Tuğkan | en |
dc.contributor.author | Arpaçay Tapucu, Dilek | - |
dc.date.accessioned | 2014-07-22T13:51:35Z | - |
dc.date.available | 2014-07-22T13:51:35Z | - |
dc.date.issued | 2002 | en |
dc.identifier.uri | http://hdl.handle.net/11147/3463 | - |
dc.description | Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2002 | en |
dc.description | Includes bibliographical references (leaves: 52-54) | en |
dc.description | Text in English; Abstract: Turkish and English | en |
dc.description | ix, 54 leaves | en |
dc.description.abstract | Computer systems resources and all data contained in the system may need to be protected against the increasing number of unauthorized access, manipulation and malicious intrusions. This thesis is concerned with intrusion management systems and specially with their investigation and recovery subsystems. The goals of these systems are to investigate intrusion attempts and recover from intrusions as fast as possible. In order to achieve these goals me should observe the fact that some of the intrusion attempts will be eventually successful should be accepted and necessary precautions should be taken.After an intrusion has taken place, the focus should be on the assessment:looking at what damage has occurred, how it happened, what changes can be made to prevent such attacks in the future. In this thesis, requirements of investigation and recovery process are determined and related guidelines developed. The similarities and differences between these guidelines are explained. | en |
dc.language.iso | en | en_US |
dc.publisher | Izmir Institute of Technology | en |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject.lcc | TK5105.59 A77 2002 | en |
dc.subject.lcsh | Computer networks--Security measures | en |
dc.subject.lcsh | Computer security | en |
dc.title | Comparison of recovery requirements with investigation requirements for intrusion management systems | en_US |
dc.type | Master Thesis | en_US |
dc.institutionauthor | Arpaçay Tapucu, Dilek | - |
dc.department | Thesis (Master)--İzmir Institute of Technology, Computer Engineering | en_US |
dc.relation.publicationcategory | Tez | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Master Thesis | - |
Appears in Collections: | Master Degree / Yüksek Lisans Tezleri |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
T000137.pdf | MasterThesis | 296 kB | Adobe PDF | View/Open |
CORE Recommender
Page view(s)
146
checked on Nov 18, 2024
Download(s)
80
checked on Nov 18, 2024
Google ScholarTM
Check
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.