Chapter 3. Intrusion Detection Overview

[ LiB ]  

Terms you'll need to understand:

  • Network intrusion

  • Attack signature

  • False positives, false negatives

  • True positives, true negatives

  • Host-based intrusion protection system (HIPS)

  • Network-based intrusion detection system (NIDS)

  • Profile-based intrusion detection (anomaly detection)

  • Signature-based intrusion detection (misuse detection)

  • Managed device

Techniques you'll need to master:

  • Understanding IDS triggers

  • Recognizing intrusion detection evasive techniques

  • Describing the Cisco Secure Intrusion Detection System (CSIDS) environment

  • Understanding CSIDS communications

We saw in Chapter 2, "Introduction to Network Security," how the need for network security is growing and evolving with the increasingly open and interconnected nature of today's networks. In this chapter, we explore how IDS components work together to proactively secure the network environment against a backdrop of both amateur and sophisticated attacks.

This chapter provides an overview of intrusion detection concepts and the various methods employed to detect, monitor, and respond to network intrusions. This chapter will familiarize you with different IDS triggers, attack identification methods , and monitoring locations, as well as provide you with an overview of intrusion detection evasive techniques. It then describes the components of the Cisco IDS protection environment and how these parts work together to enforce a layered approach to network security.

[ LiB ]  

CSIDS Exam Cram 2 (Exam 642-531)
CSIDS Exam Cram 2 (Exam 642-531)
Year: 2004
Pages: 213 © 2008-2017.
If you may any questions please contact us: