4. Preparation and installation
There are many parameters to consider when deploying a set of intrusion detection probes to protect an information system or network. First and foremost, the human cost of such an operation should not be overlooked. Deploying and maintaining such a system requires security-trained operators, available to analyze the alerts produced.
4.1 Choice of technology
4.1.1 In-house implementation or service
Implementing an intrusion detection system is complex and costly. For this reason, several companies...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Preparation and installation
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
References
- (1) - WOOD (M.), ERLINGER (M.) - Intrusion Detection Message Exchange Requirements. - IETF (22 oct. 2002). http://www.ietf.org/internet-drafts/draft-ietf-idwg-requirements-10.txt
- ...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!