U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

NFR Security (From Handbook of Computer Crime Investigation: Forensic Tools and Technology, P 93-113, 2002, Eoghan Casey, ed, -- See NCJ-195111)

NCJ Number
195115
Author(s)
Karen Frederick
Date Published
2002
Length
21 pages
Annotation
This chapter describes two products offered by NFR Security that offer monitoring and intrusion detection capabilities: the NFR Network Intrusion Detection Appliance and the Secure Log Repository.
Abstract
According to the author of this chapter, NFR Security offers several products that aid in the monitoring and detection of intrusions to computer systems. The main focus of this chapter is on one of these products, the NFR Network Intrusion Detection (NID) Appliance, which is a tool for analyzing network traffic. Additionally, the author briefly describes one other NFR Security product, the Secure Log Repository (SLR), which aids in investigations involving large numbers of logs from many different systems. The main body of this chapter details the architecture and major components of the NID as well as its’ data collection capabilities, storage capabilities, and integrity. The author also explains ways to analyze data using queries, filters, and reports. A case study is offered to show how NID may be used in forensic investigations. The remainder of the chapter focuses briefly on the Secure Log Repository’s capabilities and usefulness to forensic investigators.

Downloads

No download available

Availability