INTRUSION DETECTION SYSTEMS & ACCESS CONTROL LISTS

 

Intrusion detection systems also known as (IDS) are essential for protecting your network from being attacked by malicious individuals. they behave in a manner of security guards always monitoring the traffic from your network looking for suspicious patterns and threats which are commonly known. When any malicious activity is detected the IDS will notify you which will allow you to perform some sort of action before damage to your system can occur.

There are two different types of IDS systems host based and network based. Host based detection systems better known as (HIDS) is directly installed on individual devices that are connected to the to your network. HIDS act like body guards for each machine and detect packets that come from within the network and other threats originating from host ensuring that the traffic from the host is not affected with malware trying to spread it across the system.

Network based intrusion systems on the other hand also known as (NIDS) is a type of solution which can be deployed at various points strategically within an organizations network to access incoming and outgoing traffic. HIDS based intrusion system will monitor and detect traffic coming from every single device connected to the network and traffic leaving each device on the flowing out of the network.

Access control lists acts like a bouncer but in a digital manner to verify and identify and giving appropriate access and to safeguard sensitive data and information. auditing acts by way of surveillance recording all activity for investigation and tracking. this acts a powerful duo and protects your computer systems from any threats and access from unauthorised individuals.

 


Comments

Popular posts from this blog

PASSWORD POLICY

Data Breach

Configuring Microsoft Defender Firewall