Intrusion Detection and Prevention Systems Simplified

Contributed by Arthur J. Wyatt
This paper attempts to cover and discuss several aspects of Intrusion Prevention Systems and Intrusion Detection Systems. This paper attempts to do this is simple and basic language. Both systems are explained and defined according to the National Institute of Standards and Technology. Following that several techniques that can be used to install or implement them are described. The techniques described are hubs, port mirroring, test access points, and inline. During the discussion of each there are figures to depict and assisting in conveying how each implementation works. How each works along with the security or performance issues is discussed. The last thing talked about in this paper network segmentation and how Intrusion Prevention Systems and Intrusion Detection Systems could be used in conjunction to layer security and enforce network use and security policies.
This document is in PDF format. To view it click here.

Rate this article: 
No votes yet