Summary

Network security attacks occur despite the protection offered by access control mechanisms such as firewalls. They can be internal or external and can involve data theft or simply a denial of service. Network intrusion detection provides a suitable mechanism for detecting and preventing these attacks. This chapter looked at some of the common types of attacks and discussed some of the more common examples. We briefly looked at how Cisco's IDS fits into the picture. Finally, we looked at the famous Kevin Metnick hacking and how the Cisco IDS could have prevented it from occurring. This chapter laid down the basic concepts and the foundation we will use to go into a more specific and targeted study of the Cisco IDS in the next chapter. ...

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.