O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter Summary

Intrusion Detection Systems provide the ability to monitor systems or networks as a means to record or even catch hackers. In many cases, IDS only records and logs intrusion attempts, not actually stops them (although this limitation is disappearing at a rapid rate). However, many newer, more sophisticated IDS systems include features from other security utilities, such as vulnerability scanners and sometimes even basic firewall capabilities.

KEY TERMS

There are two main types of IDS solutions, host based and network based. A host-based IDS is installed and mainly monitors a system, such as a server, for any ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required