NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Virtual Private Network (VPN)
|
|
Firewall
|
|
Intrusion Prevention System (IPS)
|
|
Authentication, Authorization, Accounting
|
Detailed explanation-1: -A WIPS monitors wireless network traffic for signs of possible intrusion. Network behavior analysis (NBA).
Detailed explanation-2: -IDS/IPS monitors all traffic on the network to identify any known malicious behavior. One of the ways in which an attacker will try to compromise a network is by exploiting a vulnerability within a device or within software.
Detailed explanation-3: -Most IPS solutions are designed to detect attacks targeting known vulnerabilities (as well as prevent them when configured to do so). Additional features exist within IPS solutions including real-time blacklisting (RBL), malware detection (and prevention) and application identification (and control).
Detailed explanation-4: -An Intrusion Detection System (IDS) is a network monitoring solution that detects and alerts suspicious network traffic.
Detailed explanation-5: -An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.