Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
218 Security De-engineering
Hidden Costs
In order for NIDS to work eectively, promiscuous mode “nodes” are
needed around the network.
While working with IT and network operations client-side sta,
I realized at an early stage of my career that there can be consider-
able costs with any security safeguard, apart from the basic materials
cost of hardware and software. As I previously mentioned at various
points in this book, what may seem like a minor network change to a
security sta member actually can turn out to present costs in many
forms. For example, if a NIDS is to be at all useful, we would want to
log NIDS events. So then how much disk space is required, for how
long are the logs retained, and how much complexity is involved with
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355