CATEGORY: CyberBook
12.1 – Common Network Attacks
Before we move into common network attacks, let us discuss major network monitoring tools. Usually, these tools which are used by network administrators to...
12.0 – Network Security
Managing security means understanding risks, and making a decision on how much risk is tolerable. Different levels of security are proper for different organizations....
11.3 – Common Detection Methodology
The following are the most common detection methodologies:
Signature-Based Detection
Signature-based detection is certainly more along the lines of ID than firewalls, though many personal firewalls...
11.2 – IDS vs. IPS vs. Firewall
IDS
Intrusion Detection system is a system for monitoring a computer network, to determine whether or not an attack is in place. It does not...
11.1 – Intrusion Prevention System (IPS)
An advanced version of Intrusion Detection Systems is Intrusion Prevention Systems IPS). Intrusion Prevention Systems are making their marks in the IT industry, reaching...