Showing posts with label Most preferred Intrusion Detection Mechanisms. Show all posts
Showing posts with label Most preferred Intrusion Detection Mechanisms. Show all posts
Wednesday, October 9, 2013
Most preferred Intrusion Detection Mechanisms
Intrusion detection (ID) comprises a variety of categories and techniques. The prominent approaches involve determining if a system has been infected by viruses or other malicious code and applying methods for spotting an intrusion in the network by an attacker. Virus-scanning and infection-prevention techniques are used to address the virus problem and intrusion detection and response mechanisms target network intrusions.
Subscribe to:
Posts
(
Atom
)