This week’s podcast features Christian Johnson and Ashton Webster hosted by Jim Collison as they evaluate the advantages and disadvantages of different types of Intrusion Detection and Prevention Systems (IDPS), consider the future of anomaly and signature based detection, and finally evaluate the future of “threat detection” in cybersecurity. 

Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does.

Support the Average Guy Tech Scholarship Fund: https://www.patreon.com/theaverageguy

WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at http://theAverageGuy.tv/subscribe

You can contact us via email at jim@theaverageguy.tv or call in your questions or comments to be played on the show at (402) 478-8450

Listen Mobile:

 


The Evolution of IDPS

IPS vs IDS vs Firewall

–Brief explanation of difference between IDS, IPS, and Web Application Firewalls (WAF):

http://www.sans.org/security-resources/idfaq/ips-web-app-firewall.php

–Difference between firewall and IDS/IPS:

http://resources.infosecinstitute.com/network-design-firewall-idsips/

–Overview from symantec on how intrusion detection systems have evolved over time

http://www.symantec.com/connect/articles/evolution-intrusion-detection-systems

Host based vs Network Based

–Comparison of Host based and Network based intrusion detection models

http://securitywing.com/host-based-ids-vs-network-based-ids/

Signature Based vs Statistical Anomaly Based

–Comparison between anomaly and signature based detection

http://www.scmagazine.com/signature-based-or-anomaly-based-intrusion-detection-the-practice-and-pitfalls/article/30471/

–Anomaly Based Intrusion Detection:

https://secure.mcafee.com/japan/products/pdf/Deciphering_Detection_Techniques-Anomaly-Based_Detection_WP_en.pdf

Threat Intelligence

–What is threat intelligence?

http://www.itproportal.com/2014/07/02/threat-intelligence-its-about-making-criminals-work-harder/

— What should corporations be asking themselves?

http://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/Documents/cyber-threat-intelligence-final3.pdf

— Is it the outsider or insider threat that is becoming more of a threat?

http://www.insiderspyder.com/

— Norse Corp – Live Attack Intelligence “Makers of the Map”

http://www.norse-corp.com/

http://map.ipviking.com/

— There is the normal stuff, and then there is the scary stuff:

http://www.foxbusiness.com/technology/2014/08/28/sophisticated-bank-cyber-attack-said-to-target-core-infrastructure/

First the NASDAQ, now the JPMorgan

http://www.businessinsider.com/nasdaq-attacked-by-hackers-2014-7


Jim’s Twitter: http://twitter.com/#!/jcollison

Contact Christian: christian@theaverageguy.tv

Contact the show at jim@theaverageguy.tv

Find this and other great Podcasts from the Average Guy Network at http://theaverageguy.tv

Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at:
http://diehardcafe.bandcamp.com/http://cokehabitgo.tumblr.com/tagged/my-music

Some links may contain affiliate codes that benefit the Average Guy Podcast Network.