O'Reilly logo

Defend I.T.: Security by Example by Scott Laliberte, Ajay Gupta

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Protecting Borders: Perimeter Defense with an IDS

This case study presents another instance in which the client was proactive about security and sought assistance with the selection, design, and implementation of an intrusion detection system (IDS). This forethought was due in part to this client’s belief (and there were reasons) that it would increasingly be the target of cyber attacks.

Considering themselves a “likely” target, they specifically wanted to improve their ability to monitor their network. They were also interested in being able to capture network traffic and data and use that in future forensic investigations, should any be necessary.

Background

Around the turn of the millennium, the U.S. government, through regulations, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required