Chinaunix首页 | 论坛 | 博客
  • 博客访问: 628186
  • 博文数量: 1655
  • 博客积分: 10000
  • 博客等级: 上将
  • 技术积分: 16800
  • 用 户 组: 普通用户
  • 注册时间: 2008-05-28 11:10
文章分类

全部博文(1655)

文章存档

2008年(1655)

我的朋友

分类: LINUX

2008-05-28 15:04:26

ecurity is a big issue for all networks in today’s enterprise environment. Hackers and intruders have made many successful attempts to bring down high-profile company networks and web services. Many methods have been developed to secure the network infrastructure and communication over the Internet, among them the use of firewalls,encryption, and virtual private networks. Intrusion detection is a relatively new addition to such techniques. Intrusion detection methods started

appearing in the last few years. Using intrusion detection methods, you can collect and use information from known types of attacks and find out if someone is trying to attack your network or particular hosts. The information collected this way can be used to harden your network security, as well as for legal purposes. Both commercial and open source products are now available for this purpose. Many vulnerability assessment tools are also available in the market that can be used to assess different types of security holes present in your network. A comprehensive security system consists of multiple tools, including:

阅读(112) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~