There is a correlative difference here. THe key in the whole scheme of IDS, Perimeter Security and the like is to prepare and prevent attacks.
So the information and knowledge gained from Intrusion Detection Activities can be used to prepare for and prevent intrusions. For example, lets say you notice 100,000 attacks on port 111 every week. It would be wise to make sure no hostile traffic ever travels over port 111. This is using Detection as an educational and research driven approach for intrusion prevention. -daniel zubairi > With all the posts I have seen lately regarding the subject line is > there a white paper available that explains the difference between the > two and possible pros and cons of each? > TYIA > > Glenn Ponich > Network Security Administrator > Sierra Telephone > [EMAIL PROTECTED] > > > <-----------------------------------> Daniel F. Zubairi, Managing Partner SydanTech LLC ------------------------------------ 7272 Wisconsin Avenue, Suite 300 Bethesda, MD 20814 ------------------------------------ PH: 301-530-8590 FX: 240-363-0659 CL: 240-832-5279 <-----------------------------------> _______________________________________________ ISSForum mailing list [EMAIL PROTECTED] TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to https://atla-mm1.iss.net/mailman/listinfo
