• long-tail intrusion

    Long-tail intrusions include advanced persistent threats (APT). However, sometimes intrusions achieved by simpler methods and malware may be used as the starting point of a long-tail intrusion and continued by downloading new code by means such as Trojans hidden by root kits and code targeting zero...

    Margaret Rouse3,740 pointsBadges:
  • Which do you think provides better security — IDS or IPS?

    searchsecurity21,495 pointsBadges:
  • Introduction to Information Security: A Strategic-Based Approach

    In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the importance of intrusion detection and prevention.

    ITKE353,415 pointsBadges:
  • Do you have adequate security tools in place to quickly detect and react to an intrusion?

    Fran Sales1,440 pointsBadges:
  • Snort Intrusion Detection and Prevention Guide

    Answers to frequently asked questions related to the open source Snort intrusion detection and prevention system.

    ITKE353,415 pointsBadges:
  • Choosing an intrusion detection system: Network, host or application-based IDS

    Different types of intrusion detection tools do different jobs. This tip offers help comparing three different types of IDS devices: network, host and application-based IDS.

    Brien Posey9,870 pointsBadges:
  • intrusion detection (ID)

    Intrusion detection (ID) is a type of security management system for computers and networks. An ID system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization)...

    ITKE353,415 pointsBadges:
  • Rootkit levels of infection and mitigation

    PaX team developers Ed Tittel and Justin Korelc describe St. Jude and St. Michael intrusion detection systems as coutermeasures against hackers' exploitive use of rootkit.

    Etittel4,750 pointsBadges:
  • Wireless intrusion detection systems can double as WLAN monitors

    Did you know that your customer's wireless intrusion detection systems can complement existing wireless traffic analyzers? Learn how WIDS can help with performance analysis, alerts, troubleshooting and reporting in this tip.

    searchsecurity21,495 pointsBadges:
  • Intrusion detection for Linux a challenge

    In this interview, NetIQ managers try to fill in some of the security gaps in Linux and address what keeps administrators up at night.

    Jan Stafford2,995 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.