This chapter covers the following topics:
Intrusion Detection Systems: Intrusion detection systems are one of the key pieces of technology used to detect malicious activity.
Firewalls: Firewalls are devices set between trusted and untrusted networks and used to control the ingress and egress traffic.
Honeypots: These are fake systems designed to lure and “jail” an attacker so that real systems are not targeted. ...