Discuss how this measure could be implemented in a firewall and what components and architecture would be needed to do this. Why are we doing this?
Assignment #5 – VPNs, Firewalls, & IDPS Answer the following questions and explain with as much detail as necessary for each of the concepts. What will we do? 1. Describe the three logical components of an IDS. 2. List some desirable characteristics of an IDS. 3. An example of a host-based intrusion detection tool is […]