TAILIEUCHUNG - Network Security: Intrusion Detection Systems

to defend company resources: not only passively by using firewalls, virtual private networks (VPNs), encryption techniques, and whatever other tricks, but also by deploying proactive tools and devices throughout the network = IDS. | Network Security: Intrusion Detection Systems Vo Viet Minh Nhat Information Technology Dept. Faculty of Sciences Agenda Introduction to Intrusion Detection Host-Based IDSs Network-Based IDSs IDS Management Communications: Monitoring the Network Sensor Maintenance Conclusion Objectives On completing this section, you will be able to Explain the main differences between the various IDSs Describe host-based IDSs in detail Describe network-based IDSs in detail Explain how IDS management communication works Describe IDS tuning Explain how IDS maintenance works Introduction to defend company resources: not only passively by using firewalls, virtual private networks (VPNs), encryption techniques, and whatever other tricks, but also by deploying proactive tools and devices throughout the network => IDS Intrusion = someone tries to break into, misuse, or exploit a system => security policy defines what and who constitutes attempts to break into, abuse, or exploit a system. Introduction Two .

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.