Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Describe the term intrusion detection in the context of IT-
security?

Answer Posted / vik

Intrusion Detection refers to pro-active monitoring of a
network for unauthorized access as defined by the security
policy. It uses known patterns, of attacks, looks at
signatures, and can check against a known database of sites.
IDS features are built into many of the new Integrated
Security Appliances by vendors like Cisco, Juniper, etc.
Newer firewall vendors like Palo Alto networks are
integrating many features into the firewalls that overlap
with an IDS. Snort is a free IDS that has been available
for years. It is great- if you have some in house IT expertise.
IDS is often listed with IPS- Intrusion Prevention Systems.

Is This Answer Correct ?    7 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the different types of network security?

1074


Name the port used by PING.

1004


What is classful and classless routing?

984


Explain for a small lan which class of addressing is used?

947


What is an information security management system (isms)?

1097


How does arp works?

1093


What protocol is used by DNS name servers

1094


Which are the different factors that affect the security of a network?

943


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

959


What is the general data protection regulation (gdpr)?

1045


Diff bet ripv1 & ripv2?

956


Can you give me some ransomware variants?

978


What is kerberos protocol?

1017


Describe a TCP connection sequence

4447


What is utm firewall?

1042