web analytics

Intrusion Detection Policy – Source: www.techrepublic.com

Rate this post

Source: www.techrepublic.com – Author:

All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. This is the state of the world’s current security environment and for the most part enterprises, especially well-managed ones, have come to terms with this fate while also doing their best to reduce risks and prepare for how to handle such security incidents.

A clear and concise plan of action will help counteract any intrusion into an enterprise network and mitigate potential damage. This policy from TechRepublic Premium establishes guidelines and procedures your organization can follow when your computer network is compromised.

From the policy:

ANALYZE REQUIREMENTS FOR IMPLEMENTING INTRUSION DETECTION TECHNIQUES

Intrusions will be detected using two techniques, either separately or in collaboration with each other, using what is known as network or host-based detection.

Network-based intrusion detection involves a network device that looks at company network traffic for suspicious patterns. When suspicious patterns in traffic are noticed, an administrator is notified automatically.

This download includes a PDF and Word document.

Previously priced at $99, this is now available to download for $29. Or free with Premium annual subscription: click here to find out more.

Original Post URL: https://www.techrepublic.com/resource-library/whitepapers/intrusion-detection-policy/

Category & Tags: IT Policies,Security,TechRepublic Premium – IT Policies,Security,TechRepublic Premium

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts