Malicious activity has been affecting various systems on your network. You want to put a system in place that can monitor network traffic and attempt to take defensive action when network intrusions are detected. Which of the following should you use?
HIDS
HIPS
NIDS
NIPS
Implementation | |
Architecture and Design | |
Operations and Incident Response | |
Governance, Risk, and Compliance | |
Attacks, Threats, and Vulnerabilities |