O'Reilly logo

Intrusion Detection with Snort by Jack Koziol

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Origin of Attacks

Threats to information resources come in a variety of forms. Security of information can be compromised by very simple means. An example is an insider who can walk off with backup tapes of confidential customer information. Although there are many threats to digital infrastructure, this section focuses on network-borne threats that an IDS is designed to monitor for.

Network-based threats can be separated into two categories: internal and external. Network security at most organizations can be compared to an egg: The hard outer shell is somewhat difficult to penetrate, but after the outer shell is breached, the inside is soft, gooey, and offers no protection. This castle-like defense of firewalls, DMZs, hardened hosts, and IDSs ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required