There is a correlative difference here. THe key in the whole scheme
of IDS, Perimeter Security and the like is to prepare and prevent attacks.

So the information and knowledge gained from Intrusion Detection
Activities can be used to prepare for and prevent intrusions.

For example, lets say you notice 100,000 attacks on port 111 every week.
It would be wise to make sure no hostile traffic ever travels over port
111. This is using Detection as an educational and research driven
approach for intrusion prevention.

-daniel zubairi



 > With all the posts I have seen lately regarding the subject line
is
> there a white paper available that explains the difference between the
> two and possible pros and cons of each?
> TYIA
> 
> Glenn Ponich
> Network Security Administrator
> Sierra Telephone
> [EMAIL PROTECTED]
> 
> 
> 

<----------------------------------->
Daniel F. Zubairi, Managing Partner
SydanTech LLC
------------------------------------
7272 Wisconsin Avenue, Suite 300
Bethesda, MD 20814
------------------------------------
PH: 301-530-8590
FX: 240-363-0659
CL: 240-832-5279
<----------------------------------->


_______________________________________________
ISSForum mailing list
[EMAIL PROTECTED]

TO UNSUBSCRIBE OR CHANGE YOUR SUBSCRIPTION, go to 
https://atla-mm1.iss.net/mailman/listinfo

Reply via email to