NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
NIPS
|
|
Firewall
|
|
NIDS
|
|
HIDS
|
Detailed explanation-1: -A NIDS will detect suspicious behavior but most likely not react to it. To prevent it and react to it you would want a NIPS. Firewalls block certain types of traffic but by default do not check for suspicious behavior. HIDS is the host-based version of an IDS; it checks only the local computer, not the network.
Detailed explanation-2: -HIDS tools monitor the log files generated by your applications and create a historical record of activities and functions, therefore allowing you to quickly identify any anomalies and signs of an intrusion that may have occurred.
Detailed explanation-3: -An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.