Skip to Main Content
Network security and particularly, Internet security, is at the forefront of business network management and data integrity assurance for network service providers. Confidence in the use of the Internet for business purposes, both business-to-business and business-to-consumer transactions relies on effective authentication and intruder detection processes. Regrettably, the triumph of the Internet design for global information access and sharing is at risk of being tarnished as a ubiquitous open trading environment by unscrupulous and vindictive attacks. Information security is thus the overarching concern of Internet businesses and users! A general security goal is to prevent intrusions. However, no prevention measures can provide adequate security assurance, unless the organization also has an effective strategy for handling intrusion dynamics that include Preparation, Detection and Response. The scope of this paper focuses on the preparation, detection and response phases. The paper also covers, albeit briefly, pre-intrusion planning requirements, hacker perspectives and aims, risk judgements and associated technical methods, such as, foot-printing, scanning, enumeration and then gaining access into the network.