CHAPTER 11

Intrusion Detection Systems

In this chapter, you will

  • Understand host-based intrusion detection systems
  • Understand PC-based malware protection
  • Explore network-based intrusion detection systems
  • Explore network traffic shaping and filtering tools
  • Learn what honeypots are used for

Ensuring network security can be fairly easily compared to ensuring physical security— the more you want to protect and restrict access to an asset, the more security you need. In the world of physical security, you can use locks, walls, gates, guards, motion sensors, pressure plates, and so on, to protect physical assets. As you add more protective devices, you add “layers” of security that an intruder would have to overcome or breach to obtain access ...

Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.