{"id":499814,"date":"2024-11-05T13:17:01","date_gmt":"2024-11-05T13:17:01","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/as-iso-iec-159472004\/"},"modified":"2024-11-05T13:17:01","modified_gmt":"2024-11-05T13:17:01","slug":"as-iso-iec-159472004","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/as\/as-iso-iec-159472004\/","title":{"rendered":"AS ISO\/IEC 15947:2004"},"content":{"rendered":"

Adopts ISO\/IEC TR 15947:2002 which defines a framework for detection of intrusions in IT systems. <\/p>\n

Scope<\/b><\/p>\n

This is a Type 3 Technical Report (TR), which defines a framework for detection of intrusions in IT systems. Many classes of intrusions are considered. These include intrusions that are intentional or unintentional, legal or illegal, harmful or harmless and unauthorized access by insiders or outsiders. The TR focuses on:
\u2022 establishing common definitions for terms and concepts associated with an IT intrusion detection
framework,
\u2022 describing a generic model of intrusion detection,
\u2022 providing high level examples of attempts to exploit systems vulnerabilities,
\u2022 discussing common types of input data and the sources needed for an effective intrusion detection capability,
\u2022 discussing different methods and combinations of methods of intrusion detection analysis,
\u2022 describing activities\/actions in response to indications of intrusions.
This framework explains intrusion detection terms and concepts and describes the relationship among
them. Further, the framework addresses possible ordering of intrusion detection tasks and related
activities.
This TR provides the basis for a common understanding of intrusion detection. This material aims to assist IT managers to deploy within their organizations Intrusion Detection Systems (IDS) that interact and work together. This TR should facilitate collaboration among organizations across the world where
collaboration is desired and\/or essential to counter intrusion attempts.
This framework document is not intended to cover every possible detail involved in intrusion detection, such as detailed attack patterns, or statistical anomalies, or the many configurations that an IDS could have.<\/p>\n","protected":false},"excerpt":{"rendered":"

Information technology – Security techniques – IT intrusion detection framework<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
AS<\/b><\/a><\/td>\n2004-03-17<\/td>\n32<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":499829,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[659,2633],"product_tag":[],"class_list":{"0":"post-499814","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-040-10","7":"product_cat-as","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/499814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/499829"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=499814"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=499814"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=499814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}