O'Reilly logo

Eleventh Hour Network+ by Naomi Alpern

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 8 Security Standards and Services

Many tools that exist today will allow you to monitor, detect, and contain malicious activity in your environment. Each of these tools assists you in being well armed and well prepared to handle any malicious attacks that might come your way.

Hardware and Software Security Devices

Intrusion Detection Systems

An intrusion detection system (IDS) is a specialized tool that attempts to determine when malicious activity is occurring within the network. It can make this determination using a variety of different methods and features:

  • Some IDSes read and interpret the contents of log files from sensors placed on the network, routers, firewalls, servers, and other network devices, and attempt to match patterns ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required