tailieunhanh - CompTIA Network+ Certification Study Guide part 16

CompTIA’s Network+ certification Study Guide part 16 is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major update with more focus on security and wireless aspects of networking. Our new study guide has been updated accordingly with focus on network, systems, and WAN security and complete coverage of today’s wireless networking standards. | 136 CHAPTER 3 Network Devices IDS IDS is short for an Intrusion Detection System and it is designed to inspect and detect the kinds of traffic or network behavior patterns that match known attack signatures or that suggest potential unrecognized attacks may be incipient or in progress. The simplest way to define IDS is to describe it as a specialized tool that knows how to read and interpret the contents of log files from routers firewalls servers and other network devices. Furthermore an IDS often stores a database of known attack signatures and can compare patterns of activity traffic or behavior it sees in the logs it is monitoring against those signatures to recognize when a close match between a signature and current or recent behavior occurs. At that point the IDS can issue alarms or alerts take various kinds of automatic action ranging from shutting down Internet links or specific servers to launching backtraces and make other active attempts to identify attackers and actively collect evidence of their nefarious activities. By analogy an IDS does for a network what an antivirus software package does for files that enter a system it inspects the contents of network traffic to look for and deflect possible attacks. To be more specific intrusion detection means detecting unauthorized use of the network or system resources as well as attacks on the system or network. An IDS is designed and used to detect and then to deflect or deter if possible such attacks or unauthorized use of systems networks and related resources. Like firewalls IDSs may be software-based or may combine hardware and software in the form of preinstalled and preconfigured standalone IDS devices . Often IDS software runs on the same devices or servers where firewalls proxies or other boundary services operate an IDS not running on the same device or server where the firewall or other services are installed will monitor those devices closely and carefully. Although such devices tend to operate

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.