Chapter 10. IDS, Firewalls, and Honeypots
This chapter covers the following topics:
Intrusion Detection Systems (IDS): Intrusion detection systems are one of the key pieces of technology used to detect malicious activity
Firewalls: Devices set between trusted and untrusted networks and used to control the ingress and egress traffic.
Honeypots: Fake systems are networks designed to lure an attacker and jail them so that real systems are not targeted. ...