0
 Intrusion Detection or Prevention System (IDS/IPS)

IDS / IPS


IDS/ IPS is exactly what it sounds like—a powerful security tool
that detects a plethora of nasty tactics that bad guys use to exploit systems, including unau-
thorized logins and privilege increases that can give them access to your sensitive data and
files. Attacks on network resources, services, and applications—even the vile practice of
placing viruses, worms, and trojans—are also detected by IDS. However, IDS only identifies,
detects, and reports attempts of unauthorized access to the network as well as any suspicious
activity, and is the best software type for identifying an attack. However, if you want to stop
the attack in its track you need to add an IPS device.
or 
A multi-layered approach is key to protecting any size network. Many organizations are turning to both Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) for their security needs. 
An
Intrusion Prevention System (IPS)
provides computers with security by vigilantly
watching for any suspicious and potentially malicious tactics. It works in real time and, as
its name suggests, prevents these evil activities. For instance, network-based IPS monitors
the network’s traffic, looking for malicious code and other attacks and simply drops any
offensive packets while permitting all proper network traffic to flow unimpeded. So, unlike
IDS, which can identify an attack and report it, IPS can stop the attack in its tracks by
shutting down a port or dropping certain types of packets.

More information: 
www.ipv4-ipv6.blogspot.com

Post a Comment

 
Top