Describe the term intrusion detection in the context of IT-
security?

Answers were Sorted based on User's Feedback



Describe the term intrusion detection in the context of IT- security?..

Answer / vik

Intrusion Detection refers to pro-active monitoring of a
network for unauthorized access as defined by the security
policy. It uses known patterns, of attacks, looks at
signatures, and can check against a known database of sites.
IDS features are built into many of the new Integrated
Security Appliances by vendors like Cisco, Juniper, etc.
Newer firewall vendors like Palo Alto networks are
integrating many features into the firewalls that overlap
with an IDS. Snort is a free IDS that has been available
for years. It is great- if you have some in house IT expertise.
IDS is often listed with IPS- Intrusion Prevention Systems.

Is This Answer Correct ?    7 Yes 1 No

Describe the term intrusion detection in the context of IT- security?..

Answer / ash10

IDS detect the threats by watching for trends, looking for
attacks that uses particular patterns of messages, and
other factors.

Is This Answer Correct ?    4 Yes 1 No

Describe the term intrusion detection in the context of IT- security?..

Answer / s.m.feroz ahmed

Hi,

Intrusion Detection is defined as whenever an Attack is
happening the work of IDS is just to Detect an Attack and
cannot stop the Attack in terms of Firewall an attack is
detected by IDS and keeps a copy of that packet in state
table and allows to enter into Network,So to overcome this
attack one should make use of IPS Intrusion Prevention
System which not only detects an attack but also stops an
Attack.

Is This Answer Correct ?    0 Yes 1 No

Describe the term intrusion detection in the context of IT- security?..

Answer / vinay

it means someone tried to hack the security of the network.

Is This Answer Correct ?    1 Yes 5 No

Post New Answer

More Networking Security Interview Questions

What is an arp?

0 Answers  


What is Firewall? I saw in one website Firewall is software and hardware and combination of software and hardware.It is used to protect user information or avoiding crackers.how it is?Whether it is hardware?If not then why the images are like that?(a wall ).Please help me by answering this question.Advance thanks.

4 Answers   Excel,


What is RIS?

0 Answers  


What is classful and classless routing?

0 Answers  


What is the role of single sign on in authentication technologies?

0 Answers  






What is a ddos attack?

0 Answers  


What protects the Clark Wilson model?

1 Answers   Airtel,


how to block a website in xp

3 Answers  


What is a DNS resource record

0 Answers  


Define the meaning of an Authentication.

0 Answers  


What are the different type of networking / internetworking devices

0 Answers   Elgi Equipments,


Explain difference between broadcast domain and collision domain?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)