In modern network security, having only the firewall will not protect your network completely. An opt-layered security model is required, so that security can be provided at a different level. Indeed, a different security device like IDS/IPS network may be required to guard the network. IDS/IPS offers deep packet assessment for navigating network traffic. Largely, […]
12.1 – Common Network Attacks
Before we move into common network attacks, let us discuss major network monitoring tools. Usually, these tools which are used by network administrators to monitor their systems are used by hackers, to scan networks for vulnerabilities before they are attacked. Network monitoring tools play a key role in common network attacks. These tools monitor linked […]
12.0 – Network Security
Managing security means understanding risks, and making a decision on how much risk is tolerable. Different levels of security are proper for different organizations. No network is 100 percent safe, so don’t ever think you have got that level of security. We know the several benefits of Internet and computer networks. Connecting your network to […]
11.3 – Common Detection Methodology
The following are the most common detection methodologies: Signature-Based Detection Signature-based detection is certainly more along the lines of ID than firewalls, though many personal firewalls and certain business firewalls include this functionality. Basically, the computer system can be configured to look for particular patterns, flag them as malicious, and block the traffic. This is […]
11.2 – IDS vs. IPS vs. Firewall
IDS Intrusion Detection system is a system for monitoring a computer network, to determine whether or not an attack is in place. It does not avoid the attacks from reaching the different resources (though there are certain choices to configure it to send RST packets on certain platforms). IDS does not receive the traffic, from […]






