IDS

Home/Tag:IDS

Securely Transfer Files

2020-09-24T06:45:04+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , |

We, as individuals or organizations, often need to securely transfer files over the Internet to another person or organization on the Internet. In this post, we will try to get acquainted with the common solutions for this purpose and examine these file transfer methods from a security point of view. Sending a file over the [...]

IPS and IDS

2020-11-04T10:51:12+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , |

Intrusion detection is the process of monitoring the events occurring in network and analyzing them for signs of possible incidents, violations, or imminent threats to security policies. These security measures are available as intrusion detection systems (IDS) and intrusion prevention systems (IPS). At result, IDS and IPS are both parts of the network infrastructure. IDS and [...]

Operate and Maintain Detective and Preventative Measures

2020-07-15T12:11:44+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , |

Operate and Maintain Detective and Preventative Measures These days, one of the most important aspects of cyber security is operate and maintain detective and also preventative measures. In this part of this tutorial, we'll take a look at operate and maintain detective and also preventative measures to help you understand the different aspects of [...]

Conduct Logging and Monitoring Activities

2020-07-15T12:02:05+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Conduct Logging and Monitoring Activities This topic includes the methods or procedures that help to conduct the logging and monitoring activities. Event logging is an essential part of an organization’s IT operations. Intrusion Detection and Prevention These technologies can use to detect and prevent intrusions. The important thing is that both should be used [...]

Secure Network Components

2020-07-16T07:11:17+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Secure Network Components Network equipment must be securely operated and maintained. In this part of this tutorial, we'll take a look at secure networks to help you understand the different aspects of secure network components. You as a CISSP candidate need to understand security fundamentals and concepts specifically related to different types of network [...]

Go to Top