Chapter 8. Protecting Borders: Perimeter Defense with an IDS

This case study presents another instance in which the client was proactive about security and sought assistance with the selection, design, and implementation of an intrusion detection system (IDS). This forethought was due in part to this client’s belief (and there were reasons) that it would increasingly be the target of cyber attacks.

Considering themselves a “likely” target, they specifically wanted to improve their ability to monitor their network. They were also interested in being able to capture network traffic and data and use that in future forensic investigations, should any be necessary.

Background

Around the turn of the millennium, the U.S. government, through regulations, ...

Get Defend I.T.: Security by Example now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.