Meet the Guide Editor
Message from the Editor:
Intrusion Prevention has become more important as hackers have found ways to cause havoc once they are inside a system. The focus has shifted from just eliminating a malicious program to one where programs are not allowed into the system.
Editor Article Picks:
Intrusion Prevention Systems Contributors

Guide to Intrusion Prevention Systems

There are different types of intrusion protection systems (IPS); those that deal with hardware, software, or network intrusion. Their focus is on how a program or software can enter these systems, and the ways to detect it. There are two main components in IPS. The first is to identify, or detect an intrusion, and the second is to prevent the intrusion from doing any harm. Some of those activities are taking actions such as dropping the malicious packets that were detected, sending an alarm, resetting the connection and/or blocking the traffic from the compromised IP address. This Bright Hub guide to intrusion protection systems will give readers a one-source location where they can access information about this topic.

Intrusion Prevention System

 

Source: http://www.squidoo.com/Intrusion_Prevention_System

 

Latest Articles on Intrusion Prevention Systems
Information Security Primer - Part 2

In this installment of an introductory series on information security, the principle of confidentiality is examined....

Network and Host Intrusion Prevention Systems

Companies today cannot rely on just firewalls and antivirus software. With host based intrusion systems, computers are loaded with agents that analyze data and data packets to help...

Most Popular Articles on Intrusion Prevention Systems
  •  
    Snort Review - Open Source Intrusion Detection and Prevention

    You may be wondering about IDS and IPS, and which system has a proven track record, excellent performance and accuracy, and what will be around for the long term. If you haven't heard of Snort, you...

  •  
    Information Security Primer - Part 2

    In this installment of an introductory series on information security, the principle of confidentiality is examined....

  •  
    Network and Host Intrusion Prevention Systems

    Companies today cannot rely on just firewalls and antivirus software. With host based intrusion systems, computers are loaded with agents that analyze data and data packets to help protect your computer...

  •  
    A Review of Careers in Network and IT Security

    The information technology security job outlook is high as the sector is in a continuous state of flux and in its growth phase. The Bureau of Labor Statistics predicts a million new information technology...

  •  
    Information Security Primer - Part 4

    In this final installment of the Information Security Primer series, we'll examine some fundamentals of risk management, specifically the components of a sound security program. The proper application...

More About Intrusion Prevention Systems
What Is a Honeypot?

Hackers and crackers are constantly scanning and searching the networks on the Internet to find soft targets to exploit. The sheer volume of systems and large IP address space available...

A Review of Careers in Network and IT Security

The information technology security job outlook is high as the sector is in a continuous state of flux and in its growth phase. The Bureau of Labor Statistics predicts a million new...