Intrusion prevention and detection
Organizations know they must protect themselves from the mysterious enemy that is a ‘hacker’ and viruses such as LoveLetter, but often there is a misguided belief that these external threats are the main risks to businesses. There is still a fundamental lack of awareness, especially amongst small and medium-sized businesses, of the threat lurking within the organization and the technologies available to protect them.
IT security is a maze of theories, solutions and “do’s and don’ts,” where everyone has an opinion about the best product or the essential technology that businesses have to implement to protect their applications, network and critical business information. Nevertheless, despite the consistent visibility that IT security has in the press about the availability and benefits of different security solutions, a lot of companies still rely solely on anti-virus products and firewalls to keep the bad guys out.
[ Read more ]
- Review: Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID (19 June 2003)
- Review: Network Intrusion Detection 3/e (24 January 2003)