[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Computer Misuse Detection System
- To: [email protected]
- Subject: Computer Misuse Detection System
- From: [email protected]
- Date: Sat, 30 Sep 1995 07:09:06 -0400
- Comments: SEND ALL COMPLAINTS AND BLOCKING REQUESTS DIRECTLY TO
- Comments: [email protected] <Remailer Operator's Network>
- Comments: -
- Comments: FULL HEADER LOGGING IS: ON
- Comments: -
- Comments: Unauthorized or illegal use of this remailer, especially
- Comments: for spamming the internet or posting copyright violations
- Comments: will be prosecuted to the fullest extent of the law.
- Comments: -
- Comments: "You Spam, You Die." - Homer
- Comments: -
- Comments: A Free Zone Remailer V1.4 <[email protected]>
- Comments: finger [email protected] for information
- Comments: Homer Wilson Smith <[email protected]>
- Comments: ART MATRIX FRACTALS http://www.lightlink.com
- Comments: -
- Sender: [email protected]
URL: http://www.saic.com/products/cmds/index.html
*** Products and Services ***
_________________________________________________________________
COMPUTER MISUSE DETECTION SYSTEM
[CMDS]
Caught in the Act
Until now, computer misuse could not be detected
until after
the damage was done. With CMDS, the system alerts you
to
suspicious computer activity as it takes place so you
can react
immediately.
Round the Clock Security
CMDS never sleeps. Computer misuse characteristically
takes
place at times when you are not expecting it. If an
intruder
rattles your door knob at 2:00 AM, CMDS is there to
watch the
shop.
Make the Intruders Think Twice
Knowing that security software of this type is
installed will
give the potential misusers reason to reconsider
their actions.
CMDS affects the intruder's motivations by
threatening them
with unseen protection. Like police radar, they won't
know it's
there until they've been caught!
Security Through Pictures
If a picture is worth a thousand words and then CMDS
speaks
volumes about the security status of your network.
The security
trending reports show you, graphically, all the
information you
need to identify the intruders.
Off-the-Rack or Tailor Made
A well made suit off-the-rack can meet the needs of
most people
at tremendous cost savings. However, a tailor-made
suit may be
necessary when the person in need has special
requirements.
SAIC can tailor a system using CMDS core technology
to meet any
large heterogeneous network or detection
requirements.
Increase Efficiency While Reducing Cost, Time Spent, and
Losses
CMDS will increase efficiency of your security
operations by
performing faster than a manual review process. Your
security
staff will be freed up for other activities reducing
your
overall cost. Your losses will decrease through the
deterrence
and detection capabilities of CMDS.
_________________________________________________________________
More About CMDS...
o Detecting Computer Crime
o Product Description
o Designed to Detect
o Detection Capabilities
o System Requirements
o Licensing and More Information
_________________________________________________________________
Intrusion Detection Research Papers
Audit Reduction and Misuse Detection in Heterogeneous
Environments: Framework and Application.
Click here to download Macintosh Microsoft Word 5.1
file
(464K).
_________________________________________________________________
Copyright SAIC Home
_________________________________________________________________
Last updated on 07-10-95