Find an example of a system (or type of system) that you would recommend protecting with host-based IDS. Post a topic describing the system and briefly explaining why HIDS would be appropriate to use as security measure.

Leave a Reply

Your email address will not be published. Required fields are marked *

Find an example of a system (or type of system) that you would recommend protecting with host-based IDS. Post a topic describing the system and briefly explaining why HIDS would be appropriate to use as security measure.

Leave a Reply

Your email address will not be published. Required fields are marked *