Describe, Recognize, or Select Good Intrusion Detection Methodologies, Applications, and Disaster Recovery and Forensic Practices
When you connect yourself to an external network, such as the Internet, you open yourself to attack. Even if you practice the best security, there is always a chance that your network will experience an intrusion.
Intrusion Detection Systems (IDS) are becoming a mainstay for companies that want to augment their current security by actively monitoring for intrusions into their network and, in some cases, stopping attacks from occurring. Understanding how the two fundamental types of IDS design can protect your systems and network is essential to selecting the right solution for your needs.
Knowing what you should have ...