مشخصات مقاله پاورپوینت انگلیسی |
عنوان فارسی مقاله |
سیستم تشخیص نفوذ (IDS) |
عنوان انگلیسی مقاله |
INTRUSION DETECTION SYSTEMS (IDS) |
فرمت مقاله |
پاورپوینت (PPT یا PPTX) |
تعداد اسلایدها |
21 اسلاید |
قابلیت ویرایش |
دارد |
قابلیت پرینت |
دارد |
رشته های مرتبط با این مقاله |
مهندسی فناوری اطلاعات |
گرایش های مرتبط با این مقاله |
شبکه های کامپیوتری و امنیت اطلاعات |
کد محصول |
EP451 |
دانلود رایگان پاورپوینت انگلیسی سفارش ترجمه این پاورپوینت
تصویری از مقاله |
|
فهرست مطالب |
INTRUSION DETECTION SYSTEMS (IDS)
Agenda
Sources
What is an Intrusion Detection System?
Host Based Intrusion Detection
Network Based Intrusion Detection
Comparison
Hybrid Intrusion Detection
Honeypots
Passive Systems
Reactive/Active Systems
Signature Based IDS
Anomaly Based IDS
Issues
Why are IDS important?
How does it fit into your security plan?
Pros
Cons
|
بخشی از مقاله |
How does it fit into your security plan?
As a network security expert you should know you cannot just rely on one or a few tools to secure your network. You need to have a defense in depth mindset and layer your network defenses.
Through the use of inside and outside firewalls, DMZs, Routers and Switches, an IDS is a great addition to your security plan.
You can use them to identify vulnerabilities and weaknesses in your perimeter protection devices, such as: firewalls, switches and routers. The firewall rules and router access control lists can be verified regularly for compliance.
You can use IDSes to enforce security policies, such as: unauthorized Internet access, downloads of executable files, use of file sharing programs like Kazza, or Instant Messenger use.
IDSes are also an invaluable source of evidence. Logs from an IDS can become an important part of computer forensics and incident handling efforts.
|
دانلود رایگان پاورپوینت انگلیسی سفارش ترجمه این پاورپوینت