Your boss wants an intrusion detection system that can automatically identify suspicious activity on a server by using its log data. What type of IDS is she talking about?
FIDS
HIDS
NIPS
NIDS
Implementation | |
Architecture and Design | |
Operations and Incident Response | |
Governance, Risk, and Compliance | |
Attacks, Threats, and Vulnerabilities |