Introduction to Intrusion Protection and Network Security

Jennifer Vesperman

[email protected]

Megan Golding

[email protected]


Revision History
Revision 0.12002-02-17Revised by: MEG
Converted from text file. Modified wording.
Revision 0.22002-02-23Revised by: MEG
Incorporated Jenn's suggestions.
Revision 0.32002-02-24Revised by: MEG
Conforming to LDP standards. Added abstract.

Table of Contents
1. Introduction
1.1. Copyright Information
1.2. Overview
2. The Locked Front Door
3. Passwords
4. Permissions
5. Firewalls
6. Other security measures
6.1. Unused programs
6.2. Bugs & patches
6.3. Monitoring
6.4. What do I do if I think I've been broken into?
6.5. Final words
7. Links and further information