Technologies and Tools for Protecting Information Resources
Intrusion detection systems
– feature full-time monitoring tools placed at the most vulnerable points or “hot spots” of corporate networks to detect and deter intruders continually.
– generates an alarm if it finds a suspicious or anomalous event.