Nork, Yerevan, Armenia (October 1 - October 12)
Background > NATO ASI
Today we use computers for everything from banking and investing to shopping
and communicating with others through email or chat programs. Regardless of
whether or not we consider our communications top secret, we do not feel
comfortable about strangers reading our messages, using computers at an
unknown boundary to attack other systems, sending forged email, or examining
personal information stored on our computers (such as financial statements).
Network security is concerned with creating a secure inter-connected network
that is designed so that on the one hand users cannot perform actions that
they are not allowed to perform, but on the other hand can perform the actions
that they are allowed to. Network security not only involves specifying
and implementing a security policy that describes access control, but also
implementing an Intrusion Detection System (IDS) as a tool for detecting
attempted attacks or intrusions by crackers or automated attack tools and
identifying security breaches such as incoming shellcode, viruses, worms,
malware and trojan horses transmitted via a computer system or network.
Intrusion detection is traditionally achieved by examining network
communications, identifying heuristics and patterns of common attacks,
and taking action to alert network and system managers.
An intrusion-prevention system is a system which when combined with intrusion monitoring and detection via an application layer firewall may terminate connections. Thus, an intrusion prevention system exercises access control in order to protect computers from exploitation by inspecting network traffic (for signs of intrusions) at a deeper level and can make decisions based not only IP address or ports but also on application content and may also act at the host level to deny potentially malicious activity.
Today's computer infrastructure is exposed to several kinds of security threats ranging from virus attacks, unauthorized data access, sniffing and password cracking. Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to the world's economy and should be given the highest priority. Computer and network security involves many important and complicated issues and this gathering of scientists will help not only in raising awareness but also in teaching participants the state-of-the-art of security techniques.