Describe the term intrusion detection in the context of IT-
security?
Answers were Sorted based on User's Feedback
Answer / vik
Intrusion Detection refers to pro-active monitoring of a
network for unauthorized access as defined by the security
policy. It uses known patterns, of attacks, looks at
signatures, and can check against a known database of sites.
IDS features are built into many of the new Integrated
Security Appliances by vendors like Cisco, Juniper, etc.
Newer firewall vendors like Palo Alto networks are
integrating many features into the firewalls that overlap
with an IDS. Snort is a free IDS that has been available
for years. It is great- if you have some in house IT expertise.
IDS is often listed with IPS- Intrusion Prevention Systems.
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / ash10
IDS detect the threats by watching for trends, looking for
attacks that uses particular patterns of messages, and
other factors.
| Is This Answer Correct ? | 4 Yes | 1 No |
Answer / s.m.feroz ahmed
Hi,
Intrusion Detection is defined as whenever an Attack is
happening the work of IDS is just to Detect an Attack and
cannot stop the Attack in terms of Firewall an attack is
detected by IDS and keeps a copy of that packet in state
table and allows to enter into Network,So to overcome this
attack one should make use of IPS Intrusion Prevention
System which not only detects an attack but also stops an
Attack.
| Is This Answer Correct ? | 0 Yes | 1 No |
Answer / vinay
it means someone tried to hack the security of the network.
| Is This Answer Correct ? | 1 Yes | 5 No |
What is risk in IT-Security?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
How do we do authentication with message digest(md5)?
what purpose we are using the ARP ? what purposes we are using ip config?
What is a wild card certificate ? can I use it for all my appliance in the network ?
Why is it important to have a nac solution?
What is adware?
which of the following network components is PRIMARILY set up to serve as security measure by preventing unauthorzed traffic between different segments of the network?
What is a security policy?
What is the principle of least privilege?
What is Secure Sockets Layer (SSL)?
How can i check registry of the New Installing software.