Skip to main content
Taylor & Francis Group Logo
Advanced Search

Click here to search books using title name,author name and keywords.

  • Login
  • Hi, User  
    • Your Account
    • Logout
Advanced Search

Click here to search books using title name,author name and keywords.

Breadcrumbs Section. Click here to navigate to respective pages.

Chapter

Security Infrastructure: Basics of Intrusion Detection Systems

Chapter

Security Infrastructure: Basics of Intrusion Detection Systems

DOI link for Security Infrastructure: Basics of Intrusion Detection Systems

Security Infrastructure: Basics of Intrusion Detection Systems book

Security Infrastructure: Basics of Intrusion Detection Systems

DOI link for Security Infrastructure: Basics of Intrusion Detection Systems

Security Infrastructure: Basics of Intrusion Detection Systems book

ByKen Shaurette
BookInformation Security Management

Click here to navigate to parent product.

Edition 1st Edition
First Published 2003
Imprint Auerbach Publications
Pages 16
eBook ISBN 9781351073547

ABSTRACT

An intrusion detection system (IDS) inspects all inbound and outbound network activity. A company will implement a variety of sound security mechanisms such as authentication, firewalls, and access control; but there is the potential that systems are unknowingly exposed to threats from employees and non-employees. The complexity of the overall corporate environment and disparity of knowledge for security professionals subject implemented protection mechanisms to improper configuration, poor security design, or malicious misuse by trusted employees or vendor/contract personnel. An IDS requirements proposal or any other security improvement proposal will require coordination with all infrastructure technicians to be effective. Companies need to have a dynamic information security infrastructure. Intrusion detection systems are complex to implement, especially in a large environment. They can generate enormous quantities of data and require significant commitments in time to configure and manage properly. Some intrusion detection systems introduce the ability to have a real-time eye on what is happening on the network and operating systems.

T&F logoTaylor & Francis Group logo
  • Policies
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
    • Privacy Policy
    • Terms & Conditions
    • Cookie Policy
  • Journals
    • Taylor & Francis Online
    • CogentOA
    • Taylor & Francis Online
    • CogentOA
  • Corporate
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
    • Taylor & Francis Group
  • Help & Contact
    • Students/Researchers
    • Librarians/Institutions
    • Students/Researchers
    • Librarians/Institutions
  • Connect with us

Connect with us

Registered in England & Wales No. 3099067
5 Howick Place | London | SW1P 1WG © 2021 Informa UK Limited