Chapter 9. IDS, Firewalls, and Honeypots

This chapter covers the following topics:

Image Intrusion Detection Systems: Intrusion detection systems are one of the key pieces of technology used to detect malicious activity.

Image Firewalls: Firewalls are devices set between trusted and untrusted networks and used to control the ingress and egress traffic.

Image Honeypots: These are fake systems designed to lure and “jail” an attacker so that real systems are not targeted. ...

Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.