IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Detection

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Host Intrusion Detection, Network Intrusion Detection, Host IDS, Network IDS, Network Intrusion Management, ID
DEFINITION: Intrusion detection (ID) is a type of security management system for computers and networks. An ID system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization). ID uses vulnerability assessment (sometimes refered  … 
Definition continues below.
Intrusion DetectionReports
151 - 157 of 157 Matches Previous Page  |  Next Page
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Unified Threat Management Guide for Managers
sponsored by Information Security Magazine
JOURNAL ARTICLE: It's a firewall, it's an IPS, it's antivirus, it's antispam... but is it right for you?
Posted: 24 Aug 2006 | Published: 01 Jun 2006

Information Security Magazine

How to Detect Hackers on Your Web Server
sponsored by GFI Software
PRODUCT LITERATURE: A discussion of the methods used by hackers to attack IIS web servers, and how you can use event log monitoring on your web server to be alerted to successful attacks immediately.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Multiple Lines of Defense
sponsored by ENDFORCE, Inc
WHITE PAPER: No single countermeasure can protect your network from every conceivable threat, this white paper examines how to effectively mitigate risk by implementing an integrated multilayered security system for controlling endpoint attacks.
Posted: 05 Apr 2006 | Published: 31 Dec 2005

ENDFORCE, Inc

Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks
sponsored by Cisco Systems, Inc.
ANALYST REPORT: Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.
Posted: 10 Aug 2004 | Published: 24 May 2004

Cisco Systems, Inc.

WaveRunnerâ„¢ Wireless Tester
sponsored by Fluke Networks
DATA SHEET: Fluke Networks' WaveRunnerâ„¢ gives you the visibility for managing both your wireless and wireline networks.
Posted: 23 Mar 2004 | Published: 01 Sep 2002

Fluke Networks

Penetration Tests
sponsored by Internet Security Systems, Inc.
WHITE PAPER: A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.
Posted: 06 Apr 2003 | Published: 01 Jan 2001

Internet Security Systems, Inc.
151 - 157 of 157 Matches Previous Page    5 6 7    Next Page
 
INTRUSION DETECTION DEFINITION (continued): …  to as scanning), which is a technology developed to assess the security of a computer system or network.Intrusion detection functions include: Monitoring and analyzing both user and system activities Analyzing system configurations and vulnerabilities Assessing system and file integrity Ability to recognize patterns typical of attacks Analysis of abnormal activity patterns Tracking user policy violationsID systems are being developed in response to the increasing number of attacks on major sites and networks, including those of the Pentagon, the White House, NATO, and the U.S. Defense Department. … 
Intrusion Detection definition sponsored by SearchMidmarketSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement