INTRUSION DETECTION SYSTEMS & ACCESS CONTROL LISTS
Intrusion detection systems also known as (IDS) are essential for protecting
your network from being attacked by malicious individuals. they behave in a
manner of security guards always monitoring the traffic from your network
looking for suspicious patterns and threats which are commonly known. When any
malicious activity is detected the IDS will notify you which will allow you to
perform some sort of action before damage to your system can occur.
There are two different types of IDS systems host based and network based.
Host based detection systems better known as (HIDS) is directly installed on
individual devices that are connected to the to your network. HIDS act like
body guards for each machine and detect packets that come from within the network and
other threats originating from host ensuring that the traffic from the host is
not affected with malware trying to spread it across the system.
Network based intrusion systems on the other hand also known as (NIDS) is a
type of solution which can be deployed at various points strategically within
an organizations network to access incoming and outgoing traffic. HIDS based
intrusion system will monitor and detect traffic coming from every single
device connected to the network and traffic leaving each device on the flowing
out of the network.
Access control lists acts like a bouncer but in a digital manner to
verify and identify and giving appropriate access and to safeguard sensitive
data and information. auditing acts by way of surveillance recording all
activity for investigation and tracking. this acts a powerful duo and protects
your computer systems from any threats and access from unauthorised
individuals.
Comments
Post a Comment