7.6. Summary

In this chapter, you learned the basics of intrusion detection systems and how they can aid in securing a network environment. You saw some of the strengths and weaknesses of NIDS products in general. We even walked through the configuration of Snort and showed you an example of the alerts generated through a port scan.

The next chapter looks at authentication and encryption technology. Authentication and encryption have become extremely popular subjects as organizations race to provide connectivity over less-than-secure network channels.

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.