Intrusion Detection or Prevention System (IDS/IPS)
IDS/ IPS is
exactly what it sounds like—a powerful security tool
|
that
detects a plethora of nasty tactics that bad guys use to exploit systems,
including unau-
|
thorized
logins and privilege increases that can give them access to your sensitive
data and
|
files.
Attacks on network resources, services, and applications—even the vile
practice of
|
placing
viruses, worms, and trojans—are also detected by IDS. However, IDS only
identifies,
|
detects,
and reports attempts of unauthorized access to the network as well as any
suspicious
activity,
and is the best software type for identifying an attack. However, if you want
to stop
|
the
attack in its track you need to add an IPS device.
or
A multi-layered approach is key to protecting any size network. Many
organizations are turning to both Intrusion Detection Systems (IDS) and
Intrusion Prevention Systems (IPS) for their security needs.
|
Intrusion
Prevention System (IPS)
|
provides
computers with security by vigilantly
|
watching
for any suspicious and potentially malicious tactics. It works in real time
and, as
|
its
name suggests, prevents these evil activities. For instance, network-based
IPS monitors
|
the
network’s traffic, looking for malicious code and other attacks and simply
drops any
|
offensive
packets while permitting all proper network traffic to flow unimpeded. So,
unlike
|
IDS,
which can identify an attack and report it, IPS can stop the attack in its
tracks by
|
shutting down a port or dropping certain types
of packets.
More information:
www.newstips24.blogspot.com
|
কোন মন্তব্য নেই:
একটি মন্তব্য পোস্ট করুন