Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Describe the term intrusion detection in the context of IT-
security?

Answer Posted / vik

Intrusion Detection refers to pro-active monitoring of a
network for unauthorized access as defined by the security
policy. It uses known patterns, of attacks, looks at
signatures, and can check against a known database of sites.
IDS features are built into many of the new Integrated
Security Appliances by vendors like Cisco, Juniper, etc.
Newer firewall vendors like Palo Alto networks are
integrating many features into the firewalls that overlap
with an IDS. Snort is a free IDS that has been available
for years. It is great- if you have some in house IT expertise.
IDS is often listed with IPS- Intrusion Prevention Systems.

Is This Answer Correct ?    7 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?

2404


Explain for a small lan which class of addressing is used?

1010


What is the difference between arp & rarp?

1034


Name the port used by PING.

1073


What type of network do you use at home?

1073


How to implement PIX firewall security?

1050


What is the difference between ripv1 & ripv2?

1040


What is RIS?

1084


What is site-to-site vpn?

1017


What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

1034


Why do we use virtual private network?

1109


What is intrusion prevention systems (ips)?

1059


How do we use rsa for both authentication and secrecy?

1023


How does phishing work?

1027


Why should you care about the OSI Reference Model

1079