Intrusion Detection Policy
All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. This is the state of the world’s current security environment and for the most part enterprises, especially well-managed ones, have come to terms with this fate while also doing their best to reduce risks and prepare for how to handle such security incidents.
A clear and concise plan of action will help counteract any intrusion into an enterprise network and mitigate potential damage. This policy from TechRepublic Premium establishes guidelines and procedures your organization can follow when your computer network is compromised.
From the policy:
ANALYZE REQUIREMENTS FOR IMPLEMENTING INTRUSION DETECTION TECHNIQUES
Intrusions will be detected using two techniques, either separately or in collaboration with each other, using what is known as network or host-based detection.
Network-based intrusion detection involves a network device that looks at company network traffic for suspicious patterns. When suspicious patterns in traffic are noticed, an administrator is notified automatically.
This download includes a PDF and Word document.
Previously priced at $99, this is now available to download for $29. Or free with Premium annual subscription: click here to find out more.
Resource Details
* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.
* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.