Q

Reactive/proactive intrusion detection measures

Detection measures are needed to identify computer-related crime -- what is the most reactive way to detect whether...

a computer crime has been attempted or successfully concluded?

It can be the use of a lot of tools but, the first step is to prioritize your key assets and track the highest priority resource for protection first. This tracking could include a variety of tools such as logs, IDS, data integrity checking, firewall intercepts, etc. Use your security policy, vulnerability analysis, etc. to develop a proactive and a reactive policy. There is no silver bullet here.

Editor's note: Do you agree with this expert's response? If you have more to share, post it in one of our .bphAaR2qhqA^0@/searchstorage>discussion forums.


This was first published in November 2002

Dig Deeper on Secure data storage

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchSolidStateStorage

  • Flash technologies remain hot in 2016, experts predict

    Experts predict solid-state technology will remain hot in 2016, leading to the demise of high-speed hard disk drives, as ...

  • Tintri VMstore T5000

    Like all of its VM-aware storage systems, Tintri’s first all-flash array -- the Tintri VMstore T5000 -- allows admins to bypass ...

  • SolidFire SF9605

    The high-capacity SolidFire SF9605 uses SolidFire’s Element OS 8 (Oxygen) to deliver new enterprise features such as synchronous ...

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

Close