IDS: CFP: The Insider Volume 3 Issue 2

Ethan Preston (prestone@bulldog.georgetown.edu)
Sun, 18 Apr 1999 20:39:02 -0400

FAQ: See http://www.ticm.com/kb/faq/idsfaq.html
IDS: See http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html
HELP: Having problems.. Then email questions to ids-owner@uow.edu.au
NOTE: You MUST remove this line from reply messages as it will be filtered.
SPAM: DO NOT send unsolicted mail to this list.
USUB: email "unsubscribe ids" to majordomo@uow.edu.au
---------------------------------------------------------------------------


>---- Joining Requests ----
>
>When joining the list I ask you to briefly introduce yourself (to the
>mailing list <ids@uow.edu.au>), to give an outline of your interest in
>intrusion detection systems. Whether you are developing an intrusion
>detection system, or a system administrator or student who is
>currently investigating or developing a system.

I'm actually a law student with no network administration experience. I'm
interested in computer intrusions for abusive trade secret and competitive
intelligence reasons as well as kids "just" fooling around, and the
consequent litigation surrounding some of these issues.  It's good for me
to have a fuller understanding of the kinds of threats actually encountered
by sysadmins. Because computer intrusions rarely justify legal remedies, I
am interested in the typical measures taken and usual remedies available to
(and actually used by) network admins.

>Additionally you might
>want to express some personal ideas that you have about what you think
>an intrusion detection system should be.

Probably one that doesn't ever require a lawyer . . . . : )