O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

This chapter will help you understand the two main divisions of intrusion detection technologies: network-based intrusion detection systems and host-based intrusion detection systems.

You also investigate honeypots. A honeypot is a decoy box designed to attract hackers. It usually has all the logging and tracing enabled, and its security level is lowered on purpose. Honeypots are not security mechanisms in their own right; they are valuable additions to otherwise strong systems security-wise.

The next part of this chapter introduces incident response handling procedures. The basic premise of incident handling and response is that the company needs to have a clear action plan on what each response team member needs to do and when ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required