Chapter Summary
Intrusion Detection Systems provide the ability to monitor systems or networks as a means to record or even catch hackers. In many cases, IDS only records and logs intrusion attempts, not actually stops them (although this limitation is disappearing at a rapid rate). However, many newer, more sophisticated IDS systems include features from other security utilities, such as vulnerability scanners and sometimes even basic firewall capabilities.
KEY TERMS |
There are two main types of IDS solutions, host based and network based. A host-based IDS is installed and mainly monitors a system, such as a server, for any ...
Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.