The lowdown on intrusion-detection

Related Links

Stemming the tide

What is it? Intrusion-detection software is designed to monitor networks in order to detect incoming probes and attacks, and either alert a system administrator or automatically respond'or both.

What's new? New intrusion-detection systems, using pattern recognition and other artificial-intelligence software, now monitor the network packets themselves. They watch for signs of an incoming attack and alert administrators before there's a breach. Some organizations are pairing intrusion-detection software with external network monitoring services, which can more quickly detect a denial-of-service attack.

Must-know info: With the variety of potential attacks expanding'including distributed denial-of-service attacks and Domain Name System cache poisoning'that don't depend on gaining entry to a network, enterprises need to extend the perimeter of their defenses. Use tools such as remote site monitoring and response measurement, network monitoring, and automated network management that take advantage of programmed policies and pattern recognition to launch a response to a developing threat before it takes a network or Web site offline.

Featured

  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/Shutterstock.com)

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected