Open Source Security Solutions and Network Management

 

Network Managent Solutions integrated with Open Source security solutions  make a powerful Solutions for large and small enterprise. Network management solutions like OpenNMS and Nagios provide the basic framework for the Monitoring and  logging Network Events and SNMP traps for the devices connected to network.

Network security and intrusion detection is critical component of business network. Open source intrusion detection software like OPENSEC and Snort provide bulk of the intrusion detection facility.

OSSEC is a free, open-source host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting, and active response. It provides intrusion detection for most operating systems, including Linux, OpenBSD, FreeBSD, OS X, Solaris and Windows. OSSEC has a centralized, cross-platform architecture allowing multiple systems to be easily monitored and managed.

 

 OPSEC integrates with your Cloud and Network Infrastructure to provide enterprise security.  We work with OSSEC, Snort, Nagios, OpenNMS and Openstack cloud to provide an integrated solutions. Please contact us for details.

 

References

 

1.0  Network  Security - Stallings

2.0  Network Management- Mani Subramanium

3.0 Nagios- nagios.org

4.0 OPENNMS- Opennms.org

5.0 Open Source security- OSSEC- https://ossec.github.io

6.0 Intrusion Detection - SNORT- snort.org

7.0 Network Management- Georgia Tech

 

Computer  System Security and Solutions 

Overview

 This article covers the content of the   Certified Information Systems Security Professional ( CISSP)   examination content. The article also addresses the IEEE and ACM curriculum of the Computer System Security. The scope of the article  is large and as such the article will be divided into  various sections as we  progress through the article. The following topics will be covered:

 

  1.  Practical Security Assessments
  2.  Internet Authentication Protocols
  3.  Public Key Cryptography and Message Security
  4.  Legal and Ethical Aspects of Data Center
  5.  Human Resource security
  6. IT Security Plans, control and procedures
  7. Trusted Computing and Multilevel Security
  8.  Buffer Overflow
  9. Intrusion Detection
  10.  Malicious Software
  11. Access Control
  12.  Cryptographic Tools
  13.  User Authentication
  14.  Database and Cloud  Security
  15.  Denial of Service Attacks
  16. Firewalls and Intrusion  Prevention System
  17.  Software Security
  18.  Security Management and Risk Assessment
  19.  Physical  and Infrastructure Security
  20.  Security Auditing
  21.  Symmetric Encryption and Message Security
  22.  Internet Security protocol and Standards
  23.  Wireless Network Security

     

 

The  text book of Stallings and MIT-OCW course  cover broad areas and well suited for computer systems security for enterprise and small business. In case you need to implement computer security measures, please contact one of our Engineers.

 

 References:

 1.0 Computer Security- Principals and Practice-  Stallings

2.0 Computer Systems security- MIT OCW Weblink

 

 

 

 

 

Go to top